- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
05-31-2022 05:35 AM
Does Cortex XDR Prevent protect against CVE-2022-30190 (Microsoft Support Diagnostic Tool Vulnerability)?
Thank you!
05-31-2022 06:53 AM
Hello,
hope it's ok to attach mine, as it is the same issue/idea...
If this would work, your issue would be resolved as well:
05-31-2022 06:53 AM
I haven't seen anything from Palo Alto yet.
We are using the following XQL query to detect attacks, obviously it is a little bit rough and any improvement is welcome
dataset = xdr_data
| filter action_process_image_name contains "msdt.exe"
| filter action_process_image_command_line contains "PCWDiagnostic" and action_process_image_command_line contains "IT_RebrowseForFile"
| fields _time, agent_hostname as host, actor_effective_username as user, actor_process_image_path as parent_process, action_process_image_path as executed , action_process_image_command_line as command_line
05-31-2022 07:00 AM
@MartinPfeil : good idea, well done query. but you cannot prevent with it.
That's the reason i'd love to see a hashblock for msdt.exe...
05-31-2022 07:09 AM
The problem could then be, that there could be different versions with different hashes...
I just disabled the Diagnostics using a group policy which seems a better approach for me.
05-31-2022 07:17 AM
Thats true. That is why i first searched for all occuring msdt.exe and added all hashes 😉
As far as i see, disabling diagnistics doesn't seem to help here, as the binary is still there and handling urls.
The only "real" workaround, afaik, is to disable msdt url protocol, as stated by microsoft.
BUT you will have to do registry changes everwhere, and revert (if needed) later.
So, blocking the hashes in the meantime, until a patch is available, seemes to be the less invasive way to go...
05-31-2022 07:49 AM
FYI, some IOCs for this CVE, which might help:
At least the initial malicious document is already recognized by Cortex/Wildfire:
4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
05-31-2022 07:53 AM - edited 05-31-2022 08:00 AM
Hm, I'm not sure. I disabled both:
Scripted Diagnostics
and
Allow users to access and run Troubleshooting Wizards
Let's see if there will be another way to block this with Cortex soon...
Update - looks like a legit workaround:
You can disable this via GPO (which is a fully supported method vs the reg hacks)
you do this via registry:
reg add “HKLM\SOFTWARE\Policies\Microsoft\Windows\ScriptedDiagnostics” /t REG_DWORD /v EnableDiagnostics /d 0
05-31-2022 10:22 AM
The following queries can be executed for hunting successful exploitation:
// msdt.exe execution with suspicious argument
config case_sensitive = false timeframe = 30d
| dataset = xdr_data
| filter event_type = ENUM.PROCESS and action_process_image_command_line contains "msdt.exe" and action_process_image_command_line contains "it_browseforfile"
| fields agent_hostname , action_process_image_command_line , action_process_image_path , actor_process_command_line , actor_process_image_path , causality_actor_process_image_path
// office processes spawning msdt.exe
config case_sensitive = false timeframe = 30d
| dataset = xdr_data
| filter event_type = ENUM.PROCESS and action_process_image_command_line contains "msdt.exe" and actor_process_image_name in ("winword.exe", "powerpnt.exe", "excel.exe", "msaccess.exe","visio.exe","onenote.exe")
| fields agent_hostname , action_process_image_command_line , action_process_image_path , actor_process_command_line , actor_process_image_path , causality_actor_process_image_path
05-31-2022 11:42 AM
You could create a BIOC rule with that query and then assign this BIOC rule to a restriction profile so that it would prevent the action. It does the trick usually, keep in mind that BIOC rules aren't instantaneous, but depending of the actions, it usually reacts quickly enough to avoid most of the damage.
05-31-2022 11:47 AM
Great start on the query. Here's another way you could do this to avoid an and statement:
config case_sensitive = false
|dataset = xdr_data
|filter event_type = ENUM.PROCESS
|filter action_process_image_name = "msdt.exe" and action_process_image_command_line = "*PCWDiagnostic*IT_RebrowseForFile*"
|fields agent_hostname, action_process_username as User, action_process_image_name as Child_Process, action_process_image_path as Child_Path, action_process_image_command_line as Child_CMD_Line, action_process_image_sha256 as Child_SHA256, actor_process_image_name as Parent_Process, actor_process_image_path as Parent_Path, os_actor_process_command_line as Parent_CMD_Line
05-31-2022 11:53 PM
Hi @Luc_Desaulniers ,
thanks for the hint with the custom prevention rules. i really didnt think of that 🙂
works like a charm!
06-01-2022 02:29 AM
https://unit42.paloaltonetworks.com/cve-2022-30190-msdt-code-execution-vulnerability/
mentions ""WildFire and Cortex XDR categorize all known samples we’ve come across as malware.""
06-02-2022 08:23 AM
Please check out our latest blog post Prevention, Hunting and Playbooks for MSDT Zero-Day (CVE-2022-30190).
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!