CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability

L0 Member

Does Cortex XDR Prevent protect against CVE-2022-30190 (Microsoft Support Diagnostic Tool Vulnerability)?

Thank you!

13 REPLIES 13

Thats true. That is why i first searched for all occuring msdt.exe and added all hashes 😉

 

As far as i see, disabling diagnistics doesn't seem to help here, as the binary is still there and handling urls.

The only "real" workaround, afaik, is to disable msdt url protocol, as stated by microsoft.

BUT you will have to do registry changes everwhere, and revert (if needed) later.

So, blocking the hashes in the meantime, until a patch is available, seemes to be the less invasive way to go...

 

L2 Linker

FYI, some IOCs for this CVE, which might help:

New Microsoft Office Attack Vector via ms-msdt Protocol Scheme (CVE-2022-30190) - SANS Internet Stor...

At least the initial malicious document is already recognized by Cortex/Wildfire: 

4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784

 

Hm, I'm not sure. I disabled both:

Scripted Diagnostics

and
Allow users to access and run Troubleshooting Wizards

 

Let's see if there will be another way to block this with Cortex soon...

 

Update - looks like a legit workaround:

To disable the exploit

Group Policy

You can disable this via GPO (which is a fully supported method vs the reg hacks)

you do this via registry:

reg add “HKLM\SOFTWARE\Policies\Microsoft\Windows\ScriptedDiagnostics” /t REG_DWORD /v EnableDiagnostics /d 0

 

https://www.pwndefend.com/2022/05/30/office-microsoft-support-diagnostic-tool-msdt-vulnerability-fol...

 

L0 Member

The following queries can be executed for hunting successful exploitation:

 

// msdt.exe execution with suspicious argument
config case_sensitive = false timeframe = 30d
| dataset = xdr_data
| filter event_type = ENUM.PROCESS and action_process_image_command_line contains "msdt.exe" and action_process_image_command_line contains "it_browseforfile"
| fields agent_hostname , action_process_image_command_line , action_process_image_path , actor_process_command_line , actor_process_image_path , causality_actor_process_image_path

 

// office processes spawning msdt.exe
config case_sensitive = false timeframe = 30d
| dataset = xdr_data
| filter event_type = ENUM.PROCESS and action_process_image_command_line contains "msdt.exe" and actor_process_image_name in ("winword.exe", "powerpnt.exe", "excel.exe", "msaccess.exe","visio.exe","onenote.exe")
| fields agent_hostname , action_process_image_command_line , action_process_image_path , actor_process_command_line , actor_process_image_path , causality_actor_process_image_path

You could create a BIOC rule with that query and then assign this BIOC rule to a restriction profile so that it would prevent the action. It does the trick usually, keep in mind that BIOC rules aren't instantaneous, but depending of the actions, it usually reacts quickly enough to avoid most of the damage.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!