08 Jun / 2022
What Is Vulnerable?
Windows Office 2013 and later, including the latest patches for Office 2021
Microsoft Office is the latest victim to a remote code execution vulnerability which was publicly disclosed by Microsoft on the 31st of May. Nicknamed Follina, this vulnerability is actively being used against Australian organisations by threat actors, according to the ACSC.
How It Works
This vulnerability harnesses Microsoft Support Diagnostic Tool (MSDT) and a malicious URL baked into a word document. When the URL is clicked HTML will download from a webserver and execute arbitrary PowerShell code using the ms-msdt protocol. There are 3 key factors that cause Follina to be troubling to security researchers.
As of the 1st of June, there are no official patches available for vulnerable versions of Office products. There is however a simple fix to remediate against this in the interim. The MSDT URI can be disabled via a registry edit in CMD or Group Policy.
Cythera continues to monitor all managed clients and detection capabilities we have in place will likely detect any post-exploitation activities related to this vulnerability.
An Outline of Australia’s Board Director Cyber Liability Policies
Board Members and Directors can avoid harsh penalties by understanding what’s required of them.When the Australian Cyber Security Strategy was…Read More
Cythera Announces Partnership with Abnormal Security
Cythera are proud to announce a new technology partnership with Abnormal Security, bringing next generation email protection to our clients.Cyth…Read More
Does Your Organisation Need Cyber Security Training?
If you’re serious about protecting your company, then the only answer is yes! New employees are onboarded are expected to understand and abid…Read More