Windows Zero Day : Follina
May 27th 2022, Nao_sec identified an odd looking Word document in the wild, uploaded from an IP address in Belarus.
This turned out to be a zero day vulnerability in Office and/or Windows.
The document uses the Word remote template feature to retrieve a HTML file from a remote webserver, which in turn uses the ms-msdt MSProtocol URI scheme to load some code and execute some PowerShell.
This document directly exploits Follina vulnerability. It was reported to Microsoft, who decided it wasn’t a security issue (see timeline below).
Here is Follina being exploited, to an unknown payload:
Hash : d61d70a4d4c417560652542e54486beb37edce014e34a94b8fd0020796ff1ef7
MS-MSDT "Follina" Attack Vector
Mitigation / How do I stay secure?
Microsoft has published a list of all affected products as part of their Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability security update guide. Australian users of any of the affected products should ensure all relevant patches are installed as soon as possible.


