June 2, 2022, 8:19 a.m. | Jithin Nair

Security Boulevard securityboulevard.com

Background


On May 27, 2022, nao_sec found a malicious Word document submitted to Virustotal from a Belarus IP address. The document was abusing MS-MSDT URI scheme to execute PowerShell within the context of Word bypassing local Office macro policies. Microsoft has since released protection guidance and assigned CVE-2022-30190 to this vulnerability.


What is the issue?


Malicious Word documents can use the remote template feature to fetch an HTML file from a remote server and the HTML code can use Microsoft's …

advisory code code execution cve cve-2022-30190 microsoft microsoft windows msdt remote code execution support tool vulnerability windows

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Team Lead, Security Operations Center, Cyber Risk

@ Kroll | United Kingdom

Cyber Security Risk Analyst

@ College Board | Remote - Virginia

Lead - IT Security Engineer

@ Bosch Group | BENGALURU, India

Project Cybersecurity Manager

@ Alstom | Bengaluru, KA, IN

Security Consultant

@ CloudSEK | Bengaluru, Karnataka, India