24/10/2025
A Risk We Can’t Ignore: Burnout in Cyber Security
One of the key risks that we have been working through in 2025 is one of human error. Many people…
Published: 31/05/22
This was first picked up by security researcher Kevin Beaumont and has been named Follina. It has a CVE-2022-30190, and Microsoft have published an advisory and a blog.
A file can be embedded with some internet hosted content, which these days is fairly normal.
In case of a malicious file, the content is downloaded and then in turn accesses more active content. Now instead of trying to access a http: or https: link, it makes reference to a link starting with msdt:
In Windows, “ms-msdt:” is a URL type that has an automatically associated handler to open the MSDT software toolkit. MSDT is the Microsoft Support Diagnostics Tool. Whatever command is sent to the ms-msdt: URL is then executed within the Support Diagnostic Tool, effectively running untrusted code.
The potential impact of this is quite limited, as whatever malicious code is being run is only ever running as the same privilege level as the currently logged in user. As I’m sure you will be following best practise and having dedicated accounts for administrative functions, your local user should be fairly contained.
This is where this particular vulnerability is a little bit nastier. Because this doesn’t rely on Macro’s to run, opening any document that has this malicious code within it will cause the code to execute. If you use the Windows File Explorer Preview Pane, you don’t even need to open the file, simply previewing it is enough.
The quickest and simplest way to work around this is to disable/un-register the MSDT URL protocol handler within Windows. This can be done via Regedit locally, and managed through GPO or other tools such as Intune etc.
The simple process to complete this locally is to open a Command Prompt as an Administrator and run the following command to remove the protocol handling:
“reg delete HKEY_CLASSES_ROOT\ms-msdt /f”.
If you need any assistance in understanding the impact or steps to complete the workaround/mitigation, please get in touch and one of our experts will be able to help you
24/10/2025
One of the key risks that we have been working through in 2025 is one of human error. Many people…
17/10/2025
SEP2 are proud to celebrate Gartner’s recognition of Google as a Leader in their 2025 Gartner® Magic Quadrant™ for Security…
07/10/2025
At SEP2, we’re passionate about nurturing new talent and helping individuals discover their potential in the cyber security field.