An actively exploited Microsoft 0-day flaw still doesn’t have a patch

 In 0day, Biz & IT, microsoft, Support Diagnostic Tool, windows 11

An actively exploited Microsoft 0-day flaw still doesn’t have a patch

Serving the Technologist for more than a decade. IT news, reviews, and analysis.
An actively exploited Microsoft 0-day flaw still doesn’t have a patch

Enlarge (credit: mturhanlar | Getty Images)

Researchers warned last weekend that a flaw in Microsoft’s Support Diagnostic Tool could be exploited using malicious Word documents to remotely take control of target devices. Microsoft released guidance on Monday, including temporary defense measures. By Tuesday, the United States Cybersecurity and Infrastructure Security Agency had warned that “a remote, unauthenticated attacker could exploit this vulnerability,” known as Follina, “to take control of an affected system.” But Microsoft would not say when or whether a patch is coming for the vulnerability, even though the company acknowledged that the flaw was being actively exploited by attackers in the wild. And the company still had no comment about the possibility of a patch when asked by WIRED.

The Follina vulnerability in a Windows support tool can be easily exploited by a specially crafted Word document. The lure is outfitted with a remote template that can retrieve a malicious HTML file and ultimately allow an attacker to execute Powershell commands within Windows. Researchers note that they would describe the bug as a “zero-day,” or previously unknown vulnerability, but Microsoft has not classified it as such.

Read 9 remaining paragraphs | Comments

Microsoft downplays severity of vulnerability in all supported versions of Windows.

Recent Posts
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt