The Follina Vulnerability - A Critical Threat to Microsoft Office
Table of Contents
- Introduction
- Key Details
- Follina’s Reach
- Details
- Exploitation and Impact
- The Severity of Follina
- Protecting Against Follina
- Conclusion
- References
Introduction
The Follina vulnerability represents a significant risk within Microsoft Office products. It enables remote code execution (RCE) attacks, demanding immediate attention as Microsoft has released security updates to address it. However, unpatched versions persist, leaving users susceptible to potential exploitation.
Key Details
- CVE-2022-30190: Officially recognized as CVE-2022-30190 by the National Institute of Standards and Technology (NIST), Follina warrants tracking due to its severity.
- Phishing Campaigns: Cybercriminals actively exploit Follina through sophisticated phishing campaigns, luring users into opening malicious Office documents or links that trigger the vulnerability.
- MSDT Protocol: The critical issue lies in the manipulation of the “Microsoft Support Diagnostic Tool” (MSDT) protocol. Attackers leverage this protocol to execute their own PowerShell commands, often without user interaction.
- Diverse Attack Vectors: Follina can strike via email-delivered malicious Office documents, USB devices, or even during file previews (e.g., .rtf formats).
- Discovery Timeline: Unveiled as a zero-day vulnerability on
May 27, 2022
, the first known malware exploiting it surfaced onApril 7, 2022
, suggesting prior exploitation. - Escalation of Phishing Campaigns: With Follina’s discovery, cybersecurity experts noted a surge in phishing campaigns employing this vulnerability.
Follina’s Reach
Follina casts a wide net, affecting a range of Microsoft products, including Office suite versions from 2013 to 2021. Surprisingly, even with Office VBA macros disabled, users remain at risk. Given Microsoft Office’s global prevalence, both personal and corporate environments face exposure.
Details
This section dives deeper into the technical aspects of Follina:
- Execution Mechanisms: A Follina attack involves loading an external reference pointing to a malicious URL. Even with macros disabled on a system, the “Protected View” feature can be used to execute code under the security context of the user running the MS Office document. Additionally, the HTML methods
location.href
andwindow.location.href
come into play. - Malicious URL Invocation: When a user clicks on the document, it triggers a call to the host
hxxp://xxx.xx.xxx.xx/color.html
external URL resource. This resource then serves a malicious document containing a nefariousms-msdt:
command-invoking PowerShell script code. - Persistent Threat: With every execution of the MS Office document, the external resource is consistently loaded from the hardcoded address. This resource responds with a malicious payload containing an
ms-msdt:
command-invoking PowerShell Script.
This technical insight sheds light on the intricacies of Follina’s attack vectors and its methods of exploitation.
Exploitation and Impact
- State-Sponsored Threats: Follina’s severity is amplified by its exploitation by state-sponsored advanced persistent threat (APT) actors, including APT TA570, an affiliate of the notorious Qbot malware group.
- Accessibility: Both skilled attackers and novices can leverage Follina, facilitated by publicly available proofs-of-concept.
The Severity of Follina
Follina is a high-severity security vulnerability. While it requires user interaction, the interaction can be as simple as opening a malicious document or clicking a malevolent link, often delivered via email or social media. Once inside, Follina empowers attackers to execute code with the compromised Office application’s system permissions. The potential fallout spans manipulating applications, encrypting documents, escalating privileges, and compromising critical targets.
Protecting Against Follina
Addressing Follina necessitates a multi-pronged approach:
- Patch and Update: Swiftly apply Microsoft’s security updates to shield against Follina.
- Awareness is Key: Educate staff about phishing threats, fostering a vigilant user base.
- Disabling MSDT: Initially, Microsoft recommended disabling the MSDT protocol in Windows to mitigate attack vectors.
- Advanced Cybersecurity: Invest in advanced cybersecurity solutions for robust defense against zero-day attacks.
References
- Follina (CVE-2022-30190): Microsoft Office Zero-Day Exploit - LogRhythm
- Detecting Follina (CVE-2022-30190) with Indicators of Compromise (IOCs) and AI Engine (AIE) trend rules to highlight anomalous activity - LogRhythm
- Follina — Microsoft Office code execution vulnerability - Infosec Resources
- Mitigating the Follina Zero-Day Vulnerability (CVE 2022-30190) with Privilege Management for Windows - BeyondTrust
- Detect the Follina MSDT Vulnerability (CVE-2022-30190) with Qualys Multi-Vector EDR & Context XDR
- Follina Vulnerability - BlackBerry