SoylentNews
SoylentNews is people
https://soylentnews.org/

Title    Code Execution 0-day in Windows Has Been Under Active Exploit for 7 Weeks
Date    Friday June 03 2022, @05:35AM
Author    janrinok
Topic   
from the it-is-it-isn't-it-is dept.
https://soylentnews.org/article.pl?sid=22/06/02/1233207

upstart writes:

Code execution 0-day in Windows has been under active exploit for 7 weeks:

A critical code execution zero-day in all supported versions of Windows has been under active exploit for seven weeks, giving attackers a reliable means for installing malware without triggering Windows Defender and a roster of other endpoint protection products.

The Microsoft Support Diagnostic Tool vulnerability was reported to Microsoft on April 12 as a zero-day that was already being exploited in the wild, researchers from Shadow Chaser Group said on Twitter. A response dated April 21, however, informed the researchers that the Microsoft Security Response Center team didn't consider the reported behavior a security vulnerability because, supposedly, the MSDT diagnostic tool required a password before it would execute payloads.

On Monday, Microsoft reversed course, identifying the behavior with the vulnerability tracker CVE-2022-30190 and warning for the first time that the reported behavior constituted a critical vulnerability after all.

"A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word," the advisory stated. "An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user's rights."


Original Submission

Links

  1. "upstart" - https://soylentnews.org/~upstart/
  2. "Code execution 0-day in Windows has been under active exploit for 7 weeks" - https://arstechnica.com/information-technology/2022/05/code-execution-0day-in-windows-has-been-under-active-exploit-for-7-weeks/
  3. "Shadow Chaser Group" - https://twitter.com/shadowchasing1
  4. "said" - https://twitter.com/CrazymanArmy/status/1531117401181671430/photo/1
  5. "on" - https://twitter.com/CrazymanArmy/status/1531120929321152512/photo/1
  6. "response dated April 21" - https://twitter.com/CrazymanArmy/status/1531184830171742209/photo/1
  7. "identifying the behavior" - https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190
  8. "warning for the first time" - https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/
  9. "Original Submission" - https://soylentnews.org/submit.pl?op=viewsub&subid=55440

© Copyright 2026 - SoylentNews, All Rights Reserved

printed from SoylentNews, Code Execution 0-day in Windows Has Been Under Active Exploit for 7 Weeks on 2026-03-12 13:40:40