cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
kblowe
Level 11
Report Inappropriate Content
Message 11 of 20

Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability

I am deploying the Extra.DAT now for this vulnerability.

Is the expert rule still needed/required?

Sivakumar1
Employee
Employee
Report Inappropriate Content
Message 12 of 20

Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability

Hello @kblowe . Thank you for reaching out McAfee Enterprise Community. Extra Dat is added to regular DAT for certain hashes which was identified as the samples by labs team. Please find the recommendation below,

https://kc.mcafee.com/corporate/index?page=content&id=KB95707 

And please do subscribe to the article to get notifications on the update on this coverage.

Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!

ChrisQ
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 13 of 20

Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability

Knowledge Center - Coverage for CVE-2022-30190, Microsoft Windows Support Diagnostic Tool Remote Cod... doesn't mention an extra dat, or that this is covered in the regular AMCore update (so I assume it's not). 

Where is the extra dat, and when will it be added to the regular AMCore content?

Sivakumar1
Employee
Employee
Report Inappropriate Content
Message 14 of 20

Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability

Hello @ChrisQ Thank you for your post. Please find the list of hashes in the attachment which was identified by the labs team that belongs to the latest Vulnerability [CVE-2022-30190] and initially an Extra Dat was provided for the coverage for those mentioned hashes and we have it covered in regular DAT now . However the recommendation for this vulnerability would be the below article,

https://kc.mcafee.com/corporate/index?page=content&id=KB95707

Please do subscribe the article for the updates regarding the coverage

Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!

Shamini
Level 7
Report Inappropriate Content
Message 15 of 20

Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability

is the dat file released?

Sivakumar1
Employee
Employee
Report Inappropriate Content
Message 16 of 20

Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability

Hello @Shamini . Thank you for your post. Please find the list of hashes in the attachment which was identified by the labs team that belongs to the latest Vulnerability [CVE-2022-30190] and initially an Extra Dat was provided for the coverage for those mentioned hashes and we have it covered in regular DAT now . However the recommendation for this vulnerability would be the below article,

https://kc.mcafee.com/corporate/index?page=content&id=KB95707

Please do subscribe the article for the updates regarding the coverage

Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!

billmoller
Level 10
Report Inappropriate Content
Message 17 of 20

Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability

What good are hashes going to do?!  MSDT can be called and exploited from any MSDT URL...  Hashes might block the current malicious executables in the wild that are taking advantage of this monumentally terrible attack vector, but it won't stop ALL malicious executables which one must assume will skyrocket, especially given that still no patch exists from Microsoft...

I concede I'm no expert, certainly not to the level of McAfee whose business is that of virus/malware prevention, and that none of this is McAfee's fault, but in my very humble opinion, the only true fix right now is to block all executions of msdt.exe.  It is an executable not necessary for normal business functions.

Again, IMHO, being blocked from running a potentially helpful troubleshooting from Microsoft is an exceedingly small price to pay to block all attempts to use the same troubleshooting tool maliciously...

Again, that's just me, not trying to argue, do with my comments what you wish.  Thank you for your time.

Sivakumar1
Employee
Employee
Report Inappropriate Content
Message 18 of 20

Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability

Hello @billmoller . Thank you for your post. Yes you are correct. Hash coverage done by McAfee ENS is only for those hashes which are tested with. However there are lot of recommendations other than the hashes [ Exploit Prevention Rule and the signatures , Access Protection Rules, Adaptive Threat Protection Rules] which is mentioned in the article below,

https://kc.mcafee.com/corporate/index?page=content&id=KB95707

And there is also a Work Around 2,

Microsoft Workaround:
Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability

Disable the MSDT URL Protocol:
Disabling MSDT URL protocol prevents troubleshooters being launched as links including links throughout the operating system. Troubleshooters can still be accessed using the Get Help application and in system settings as other or additional troubleshooters. Follow these steps to disable:

  1. Run Command Prompt as Administrator.
  2. To back up the registry key, execute the command “reg export HKEY_CLASSES_ROOT\ms-msdt filename“
  3. Execute the command “reg delete HKEY_CLASSES_ROOT\ms-msdt /f”.

 
Undo the workaround:

  1. Run Command Prompt as Administrator.
  2. To restore the registry key, execute the reg import filename command.

 

Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!

billmoller
Level 10
Report Inappropriate Content
Message 19 of 20

Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability

Another reason to block msdt.exe entirely... DogWalk...

"Researchers Warn of Unpatched "DogWalk" Microsoft Windows Vulnerability"

"While all files downloaded and received via email include a Mark-of-the-Web (MOTW) tag that's used to determine their origin and trigger an appropriate security response, 0patch's Mitja Kolsek noted that the MSDT application is not designed to check this flag and hence allows the .diagcab file to be opened without warning."

{link is apparently prohibited by McAfee, so google: the hacker news dogwalk msdt}

billmoller
Level 10
Report Inappropriate Content
Message 20 of 20

Re: CVE-2022-30190 - Microsoft Support Diagnostic Tool Vulnerability

It looks like Microsoft has released a patch for msdt (CVE-2022-30190 - Security Update Guide - Microsoft - Microsoft Windows Support Diagnostic Tool (MSDT...), and with my recommended mitigation in place, the upgrade will fail to install (access denied).

IMHO, I would [and have] disable[d]/delete[d] my workaround (to block all executions of msdt.exe) to allow the June 2022 MSFT patches to successfully install.

Thank you

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from product experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by employees.
Join the Community
Join the Community