Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT

A Zero-day Remote Code Execution Vulnerability with high severity has been identified as CVE-2022-30190 “FOLLINA” in Microsoft Windows Support Diagnostic Tool (MSDT). MSDT is a tool present on Windows version 7 and above and is used for diagnosis of problems in applications such as Ms Office Documents when any user reports problem to Microsoft support. […]

The post Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

June 3, 2022
Read More >>

let’s play with a ZERO-DAY vulnerability “follina” #Linux #NetworkAdmin #NetworkChuck #Python #RaspberryPi #Security #VirtualMachines #MaryPatriotNews [Video]

Want to become a HACKER? ITProTV has you covered: https://ntck.co/itprotv (30% off FOREVER) *affiliate linkIn this video NetworkChuck teamed up with @John Hammond to talk about the NEW and SCARY Microsoft Vulnerability. NetworkChuck and John Hammond are going to teach you about a new dangerous Windows Zero-day vulnerability called “follina” and they are even going to show you how to test it out in your own Zero-day lab using VirtualBox!! Dubbed CVE-2022-30190, this vulnerability takes advantage of the Microsoft Support Diagnostic Tool (msdt) in Microsoft Office. So far, we have seen it the exploit successfully occur with Microsoft Word utilized .doc and .rtf variants. This is a high severity exploit given the remote code execution. John Hammond’s YouTube Video: https://youtu.be/dGCOhORNKRk🧪🧪Try it yourself!! (Links, docs, and walkthrough): https://ntck.co/follinalinksSPECIAL THANKS to John Hammond (go check him out!!)—————————————————-YouTube: https://www.youtube.com/c/JohnHammond010-Twitter: https://twitter.com/_JohnHammond-his amazing article on Follina: https://www.huntress.com/blog/microsoft-office-remote-code-execution-follina-msdt-bug🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy**Sponsored by ITProTVSUPPORT NETWORKCHUCK—————————————————➡️NetworkChuck membership: https://ntck.co/Premium☕☕ COFFEE and MERCH: https://ntck.co/coffeeCheck out my new channel: https://ntck.co/ncclips🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuckSTUDY WITH ME on Twitch: https://bit.ly/nc_twitchREADY TO LEARN??—————————————————-Learn Python: https://bit.ly/3rzZjzz-Get your CCNA: https://bit.ly/nc-ccnaFOLLOW ME EVERYWHERE—————————————————Instagram: https://www.instagram.com/networkchuck/Twitter: https://twitter.com/networkchuckFacebook: https://www.facebook.com/NetworkChuck/Join the Discord server: http://bit.ly/nc-discord0:00 ⏩ Intro1:58 ⏩ How does CVE-2022-30190 work??6:33 ⏩ What happens when you open the file?9:23 ⏩ Let’s set up our zero-day vulnerability lab!17:29 ⏩Time to test the Malware!20:00 ⏩ OutroAFFILIATES & REFERRALS—————————————————(GEAR I USE…STUFF I RECOMMEND)My network gear: https://geni.us/L6wyIUjAmazon Affiliate Store: https://www.amazon.com/shop/networkchuckBuy a Raspberry Pi: https://geni.us/aBeqAL#follina #cve202230190 #microsoft

June 2, 2022
Read More >>