cnvd-2022-42150
Vulnerability from cnvd

Title: 微软支持诊断工具远程代码执行漏洞

Description:

微软支持诊断工具(MSDT,Microsoft Support Diagnostic Tool)是一种实用程序,用于排除故障并收集诊断数据,供专业人员分析和解决问题。Microsoft Office是由微软公司开发的一款常用办公软件。

微软支持诊断工具存在远程代码执行漏洞,未经身份验证的攻击者利用该漏洞,诱使用户直接访问或者预览恶意的Office文档,通过恶意Office文档中的远程模板功能,从服务器获取包含恶意代码的HTML文件并执行,从而实现以当前用户权限下的任意代码执行攻击。

Severity:

Formal description:

目前,微软公司已发布了漏洞缓解措施,暂未发布漏洞补丁: https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/

Reference: https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/

Impacted products
Name
['Microsoft Windows 7 SP1', 'Microsoft Windows 8.1', 'Microsoft Windows RT 8.1 SP0', 'Microsoft Windows Server 2012 R2', 'Microsoft Windows 10 1607', 'Microsoft Windows Server 2012', 'Microsoft Windows Server 2016 (Server Core installation)', 'Microsoft Windows 10', 'Microsoft Windows Server 2016 null', 'Microsoft Windows Server 2008 R2 SP1', 'Microsoft Windows Server 2008 SP2', 'Microsoft Windows Server 2019', 'Microsoft Windows 10 1809', 'Microsoft Windows 10 1809', 'Microsoft Windows 10 20H2', 'Microsoft Windows Server 20H2', 'Microsoft Windows 10 21H1', 'Microsoft Windows Server 2019 (Server Core installation)', 'Microsoft Windows Server 2022', 'Microsoft Windows 11', 'Microsoft Windows 10 21H2', 'Microsoft Windows Server 2022 (Server Core installation)', 'Microsoft Windows Server 2022 Azure Edition Core Hotpatch']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2022-30190"
    }
  },
  "description": "\u5fae\u8f6f\u652f\u6301\u8bca\u65ad\u5de5\u5177\uff08MSDT\uff0cMicrosoft Support Diagnostic Tool\uff09\u662f\u4e00\u79cd\u5b9e\u7528\u7a0b\u5e8f\uff0c\u7528\u4e8e\u6392\u9664\u6545\u969c\u5e76\u6536\u96c6\u8bca\u65ad\u6570\u636e\uff0c\u4f9b\u4e13\u4e1a\u4eba\u5458\u5206\u6790\u548c\u89e3\u51b3\u95ee\u9898\u3002Microsoft Office\u662f\u7531\u5fae\u8f6f\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u6b3e\u5e38\u7528\u529e\u516c\u8f6f\u4ef6\u3002\n\n\u5fae\u8f6f\u652f\u6301\u8bca\u65ad\u5de5\u5177\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u672a\u7ecf\u8eab\u4efd\u9a8c\u8bc1\u7684\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\uff0c\u8bf1\u4f7f\u7528\u6237\u76f4\u63a5\u8bbf\u95ee\u6216\u8005\u9884\u89c8\u6076\u610f\u7684Office\u6587\u6863\uff0c\u901a\u8fc7\u6076\u610fOffice\u6587\u6863\u4e2d\u7684\u8fdc\u7a0b\u6a21\u677f\u529f\u80fd\uff0c\u4ece\u670d\u52a1\u5668\u83b7\u53d6\u5305\u542b\u6076\u610f\u4ee3\u7801\u7684HTML\u6587\u4ef6\u5e76\u6267\u884c\uff0c\u4ece\u800c\u5b9e\u73b0\u4ee5\u5f53\u524d\u7528\u6237\u6743\u9650\u4e0b\u7684\u4efb\u610f\u4ee3\u7801\u6267\u884c\u653b\u51fb\u3002",
  "formalWay": "\u76ee\u524d\uff0c\u5fae\u8f6f\u516c\u53f8\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u7f13\u89e3\u63aa\u65bd\uff0c\u6682\u672a\u53d1\u5e03\u6f0f\u6d1e\u8865\u4e01\uff1a\r\nhttps://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2022-42150",
  "openTime": "2022-05-31",
  "products": {
    "product": [
      "Microsoft Windows 7 SP1",
      "Microsoft Windows 8.1",
      "Microsoft Windows RT 8.1 SP0",
      "Microsoft Windows Server 2012 R2",
      "Microsoft Windows 10 1607",
      "Microsoft Windows Server 2012",
      "Microsoft Windows Server 2016 (Server Core installation)",
      "Microsoft Windows 10",
      "Microsoft Windows Server 2016 null",
      "Microsoft Windows Server 2008 R2 SP1",
      "Microsoft Windows Server 2008 SP2",
      "Microsoft Windows Server 2019",
      "Microsoft Windows 10 1809",
      "Microsoft Windows 10 1809",
      "Microsoft Windows 10 20H2",
      "Microsoft Windows Server 20H2",
      "Microsoft Windows 10 21H1",
      "Microsoft Windows Server 2019  (Server Core installation)",
      "Microsoft Windows Server 2022",
      "Microsoft Windows 11",
      "Microsoft Windows 10 21H2",
      "Microsoft Windows Server 2022 (Server Core installation)",
      "Microsoft Windows Server 2022 Azure Edition Core Hotpatch"
    ]
  },
  "referenceLink": "https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/",
  "serverity": "\u9ad8",
  "submitTime": "2022-05-31",
  "title": "\u5fae\u8f6f\u652f\u6301\u8bca\u65ad\u5de5\u5177\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…