{"id":19218,"date":"2022-06-01T09:10:08","date_gmt":"2022-06-01T17:10:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/06\/01\/news-12951\/"},"modified":"2022-06-01T09:10:08","modified_gmt":"2022-06-01T17:10:08","slug":"news-12951","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/06\/01\/news-12951\/","title":{"rendered":"FAQ: Mitigating Microsoft Office&#8217;s &#8216;Follina&#8217; zero-day"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Wed, 01 Jun 2022 16:36:44 +0000<\/strong><\/p>\n<p>On Monday May 30, 2022, Microsoft issued&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-30190\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-30190<\/a> for a zero-day remote code vulnerability, &#8216;Follina&#8217;, already being exploited in the wild via malicious Word documents.<\/p>\n<p><em><strong>Q: What exactly is Follina?<\/strong><\/em><\/p>\n<p>A: Follina is the nickname given to a new vulnerability discovered as a zero-day and identified as CVE-2022-30190. In technical terms it is a Remote Code Execution Vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).<\/p>\n<p><em><strong>Q: But what does it mean, and is this a serious vulnerability?<\/strong><\/em><\/p>\n<p>A: An attacker can send you a malicious Office document that will compromise your machine with malware when you open it. It is serious since it is already actively being exploited in the wild and doesn&#8217;t require users to enable macros.<\/p>\n<p><em><strong>Q: Does Malwarebytes protect against Follina?<\/strong><\/em><\/p>\n<p>A: Yes, it does. Please see additional steps below based on your product to ensure you are protected.<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/Follina_block.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57076\" data-permalink=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/faq-mitigating-microsoft-offices-follina-zero-day\/attachment\/follina_block\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/Follina_block.png\" data-orig-size=\"1035,660\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Follina_block\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/Follina_block-300x191.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/Follina_block-600x383.png\" loading=\"lazy\" width=\"1035\" height=\"660\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/Follina_block.png\" alt=\"\" class=\"wp-image-57076\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/Follina_block.png 1035w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/Follina_block-300x191.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/Follina_block-600x383.png 600w\" sizes=\"auto, (max-width: 1035px) 100vw, 1035px\" \/><\/a><\/figure>\n<h2>How to add protection with Malwarebytes<\/h2>\n<h3>Malwarebytes Premium (Consumer)<\/h3>\n<p>Follow the instructions below to add <code>sdiagnhost.exe<\/code> as a new protected application.<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/MB4.gif\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57071\" data-permalink=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/faq-mitigating-microsoft-offices-follina-zero-day\/attachment\/mb4-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/MB4.gif\" data-orig-size=\"882,624\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"MB4\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/MB4-300x212.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/MB4-600x424.gif\" loading=\"lazy\" width=\"882\" height=\"624\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/MB4.gif\" alt=\"\" class=\"wp-image-57071\" \/><\/a><\/figure>\n<h3>Malwarebytes Nebula (Enterprise)<\/h3>\n<p>Follow the instructions below to add <code>sdiagnhost.exe<\/code> as a new protected application.<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/Nebula.gif\" data-rel=\"lightbox-image-2\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57074\" data-permalink=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/faq-mitigating-microsoft-offices-follina-zero-day\/attachment\/nebula-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/Nebula.gif\" data-orig-size=\"1420,839\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Nebula\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/Nebula-300x177.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/Nebula-600x355.gif\" loading=\"lazy\" width=\"1420\" height=\"839\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/Nebula.gif\" alt=\"\" class=\"wp-image-57074\" \/><\/a><\/figure>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/faq-mitigating-microsoft-offices-follina-zero-day\/\">FAQ: Mitigating Microsoft Office&#8217;s &#8216;Follina&#8217; zero-day<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/faq-mitigating-microsoft-offices-follina-zero-day\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Wed, 01 Jun 2022 16:36:44 +0000<\/strong><\/p>\n<p>FAQ for the new Follina zero-day vulnerability. What you can do to protect your computers right now.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/faq-mitigating-microsoft-offices-follina-zero-day\/\">FAQ: Mitigating Microsoft Office&#8217;s &#8216;Follina&#8217; zero-day<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[26347,22783,26337,11524],"class_list":["post-19218","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cve-2022-30190","tag-exploits-and-vulnerabilities","tag-follina","tag-zero-day"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19218"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19218\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19218"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}