<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495350#M2061</link>
    <description>&lt;P&gt;Does Cortex XDR Prevent protect against CVE-2022-30190 (Microsoft Support Diagnostic Tool Vulnerability)?&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
    <pubDate>Tue, 31 May 2022 12:35:18 GMT</pubDate>
    <dc:creator>NiekMeulendijks</dc:creator>
    <dc:date>2022-05-31T12:35:18Z</dc:date>
    <item>
      <title>CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495350#M2061</link>
      <description>&lt;P&gt;Does Cortex XDR Prevent protect against CVE-2022-30190 (Microsoft Support Diagnostic Tool Vulnerability)?&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 12:35:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495350#M2061</guid>
      <dc:creator>NiekMeulendijks</dc:creator>
      <dc:date>2022-05-31T12:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495516#M2064</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;hope it's ok to attach mine, as it is the same issue/idea...&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If this would work, your issue would be resolved as well:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-does-not-block-windows-binaries/td-p/495153" target="_blank"&gt;https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-does-not-block-windows-binaries/td-p/495153&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 13:53:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495516#M2064</guid>
      <dc:creator>RonaldWeiss</dc:creator>
      <dc:date>2022-05-31T13:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495517#M2065</link>
      <description>&lt;P&gt;I haven't seen anything from Palo Alto yet.&lt;/P&gt;&lt;P&gt;We are using the following XQL query to detect attacks, obviously it is a little bit rough and any improvement is welcome&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;dataset = xdr_data&lt;BR /&gt;| filter action_process_image_name contains "msdt.exe"&lt;BR /&gt;| filter action_process_image_command_line contains "PCWDiagnostic" and action_process_image_command_line contains "IT_RebrowseForFile"&lt;BR /&gt;| fields _time, agent_hostname as host, actor_effective_username as user, actor_process_image_path as parent_process, action_process_image_path as executed , action_process_image_command_line as command_line&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 13:53:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495517#M2065</guid>
      <dc:creator>MartinPfeil</dc:creator>
      <dc:date>2022-05-31T13:53:47Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495539#M2066</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/204243"&gt;@MartinPfeil&lt;/a&gt;&amp;nbsp;: good idea, well done query. but you cannot prevent with it.&amp;nbsp;&lt;BR /&gt;That's the reason i'd love to see a hashblock for msdt.exe...&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 14:00:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495539#M2066</guid>
      <dc:creator>RonaldWeiss</dc:creator>
      <dc:date>2022-05-31T14:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495552#M2067</link>
      <description>&lt;P&gt;The problem could then be, that there could be different versions with different hashes...&lt;/P&gt;&lt;P&gt;I just disabled the Diagnostics using a group policy which seems a better approach for me.&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 14:09:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495552#M2067</guid>
      <dc:creator>SHoehne</dc:creator>
      <dc:date>2022-05-31T14:09:53Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495577#M2068</link>
      <description>&lt;P&gt;Thats true. That is why i first searched for all occuring msdt.exe and added all hashes &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as i see, disabling diagnistics doesn't seem to help here, as the binary is still there and handling urls.&lt;/P&gt;&lt;P&gt;The only "real" workaround, afaik, is to disable msdt url protocol, as stated by microsoft.&lt;/P&gt;&lt;P&gt;BUT you will have to do registry changes everwhere, and revert (if needed) later.&lt;/P&gt;&lt;P&gt;So, blocking the hashes in the meantime, until a patch is available, seemes to be the less invasive way to go...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 14:17:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495577#M2068</guid>
      <dc:creator>RonaldWeiss</dc:creator>
      <dc:date>2022-05-31T14:17:17Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495654#M2069</link>
      <description>&lt;P&gt;FYI, some IOCs for this CVE, which might help:&lt;/P&gt;&lt;P&gt;&lt;A href="https://otx.alienvault.com/pulse/6295ec3a8e83c71b3322c35c" target="_blank"&gt;New Microsoft Office Attack Vector via ms-msdt Protocol Scheme (CVE-2022-30190) - SANS Internet Storm Center - AlienVault - Open Threat Exchange&lt;/A&gt;&lt;/P&gt;&lt;P&gt;At least the initial malicious document is already recognized by Cortex/Wildfire:&amp;nbsp;&lt;/P&gt;&lt;P&gt;4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 14:49:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495654#M2069</guid>
      <dc:creator>RonaldWeiss</dc:creator>
      <dc:date>2022-05-31T14:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495666#M2070</link>
      <description>&lt;P&gt;Hm, I'm not sure. I disabled both:&lt;/P&gt;&lt;P&gt;Scripted Diagnostics&lt;/P&gt;&lt;P&gt;and&lt;BR /&gt;Allow users to access and run Troubleshooting Wizards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let's see if there will be another way to block this with Cortex soon...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Update - looks like a legit workaround:&lt;/P&gt;&lt;H1&gt;To disable the exploit&lt;/H1&gt;&lt;H2&gt;Group Policy&lt;/H2&gt;&lt;P&gt;You can disable this via GPO (which is a fully supported method vs the reg hacks)&lt;/P&gt;&lt;P&gt;you do this via registry:&lt;/P&gt;&lt;P&gt;reg add “HKLM\SOFTWARE\Policies\Microsoft\Windows\ScriptedDiagnostics” /t REG_DWORD /v EnableDiagnostics /d 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.pwndefend.com/2022/05/30/office-microsoft-support-diagnostic-tool-msdt-vulnerability-follina/" target="_blank"&gt;https://www.pwndefend.com/2022/05/30/office-microsoft-support-diagnostic-tool-msdt-vulnerability-follina/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 15:00:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495666#M2070</guid>
      <dc:creator>SHoehne</dc:creator>
      <dc:date>2022-05-31T15:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495982#M2071</link>
      <description>&lt;P&gt;The following queries can be executed for hunting successful exploitation:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;// msdt.exe execution with suspicious argument&lt;BR /&gt;config case_sensitive = false timeframe = 30d&lt;BR /&gt;| dataset = xdr_data&lt;BR /&gt;| filter event_type = ENUM.PROCESS and action_process_image_command_line contains "msdt.exe" and action_process_image_command_line contains "it_browseforfile"&lt;BR /&gt;| fields agent_hostname , action_process_image_command_line , action_process_image_path , actor_process_command_line , actor_process_image_path , causality_actor_process_image_path&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;// office processes spawning msdt.exe&lt;BR /&gt;config case_sensitive = false timeframe = 30d&lt;BR /&gt;| dataset = xdr_data&lt;BR /&gt;| filter event_type = ENUM.PROCESS and action_process_image_command_line contains "msdt.exe" and actor_process_image_name in ("winword.exe", "powerpnt.exe", "excel.exe", "msaccess.exe","visio.exe","onenote.exe")&lt;BR /&gt;| fields agent_hostname , action_process_image_command_line , action_process_image_path , actor_process_command_line , actor_process_image_path , causality_actor_process_image_path&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 17:22:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/495982#M2071</guid>
      <dc:creator>ZAB3115</dc:creator>
      <dc:date>2022-05-31T17:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/496106#M2073</link>
      <description>&lt;P&gt;You could create a BIOC rule with that query and then assign this BIOC rule to a restriction profile so that it would prevent the action. It does the trick usually, keep in mind that BIOC rules aren't instantaneous, but depending of the actions, it usually reacts quickly enough to avoid most of the damage.&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 18:42:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/496106#M2073</guid>
      <dc:creator>Luc_Desaulniers</dc:creator>
      <dc:date>2022-05-31T18:42:58Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/496113#M2074</link>
      <description>&lt;P&gt;Great start on the query. Here's another way you could do this to avoid an and statement:&lt;/P&gt;&lt;P&gt;config case_sensitive = false&lt;BR /&gt;|dataset = xdr_data&lt;BR /&gt;|filter event_type = ENUM.PROCESS&lt;BR /&gt;|filter action_process_image_name = "msdt.exe" and action_process_image_command_line = "*PCWDiagnostic*IT_RebrowseForFile*"&lt;BR /&gt;|fields agent_hostname, action_process_username as User, action_process_image_name as Child_Process, action_process_image_path as Child_Path, action_process_image_command_line as Child_CMD_Line, action_process_image_sha256 as Child_SHA256, actor_process_image_name as Parent_Process, actor_process_image_path as Parent_Path, os_actor_process_command_line as Parent_CMD_Line&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 18:47:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/496113#M2074</guid>
      <dc:creator>Luc_Desaulniers</dc:creator>
      <dc:date>2022-05-31T18:47:45Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/496671#M2076</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/177062"&gt;@Luc_Desaulniers&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;thanks for the hint with the custom prevention rules. i really didnt think of that &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;works like a charm!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2022 06:53:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/496671#M2076</guid>
      <dc:creator>RonaldWeiss</dc:creator>
      <dc:date>2022-06-01T06:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/496852#M2078</link>
      <description>&lt;P&gt;&lt;A href="https://unit42.paloaltonetworks.com/cve-2022-30190-msdt-code-execution-vulnerability/" target="_blank"&gt;https://unit42.paloaltonetworks.com/cve-2022-30190-msdt-code-execution-vulnerability/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;mentions ""WildFire and Cortex XDR categorize all known samples we’ve come across as malware.""&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2022 09:29:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/496852#M2078</guid>
      <dc:creator>parreira</dc:creator>
      <dc:date>2022-06-01T09:29:30Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/498404#M2088</link>
      <description>&lt;P&gt;Please check out our latest blog post &lt;A href="https://www.paloaltonetworks.com/blog/security-operations/prevention-hunting-and-playbooks-for-msdt-zero-day-cve-2022-30190/" target="_self"&gt;&lt;EM&gt;Prevention, Hunting and Playbooks for MSDT Zero-Day (CVE-2022-30190)&lt;/EM&gt;&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2022 15:23:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/m-p/498404#M2088</guid>
      <dc:creator>kcross</dc:creator>
      <dc:date>2022-06-02T15:23:11Z</dc:date>
    </item>
  </channel>
</rss>

