Beginning in June, the researchers in the nao_sec team found the Follina zero-day vulnerability, which allows remote code execution on Windows machines.
Interesting maldoc was submitted from Belarus. It uses Word’s external link to load the HTML and then uses the “ms-msdt” scheme to execute PowerShell code.https://t.co/hTdAfHOUx3 pic.twitter.com/rVSb02ZTwt
— nao_sec (@nao_sec) May 27, 2022
The vulnerability allows code to be run remotely on Windows systems. In some cases, the attack can be successful even if the victim does not open the file but only uses the preview feature or opens it in safe mode. The vulnerability, which the researchers named Follina, was later renamed CVE-2022.
June 14With the Windows security update released in 2022 Microsoft Support Diagnostics It closed the vulnerability related to Utility.
[vc_row][vc_column][vc_cta h2=”” add_button=”bottom” btn_title=”Teklif Talep Edin” btn_style=”flat” btn_shape=”square” btn_color=”danger” css_animation=”fadeInLeft” btn_link=”url:https%3A%2F%2Fcyberartspro.com%2Fteklif-isteme-formu%2F||target:%20_blank|”]Siber Güvenlik, Dijital Dönüşüm, MSSP, Sızma Testi, KVKK, GDPR, ISO 27001, ISO 27701 ve DDO Bilgi ve İletişim Güvenliği Rehberi başlıklarıyla ilgili teklif almak için lütfen tıklayın.[/vc_cta][/vc_column][/vc_row]