I am deploying the Extra.DAT now for this vulnerability.
Is the expert rule still needed/required?
Hello @kblowe . Thank you for reaching out McAfee Enterprise Community. Extra Dat is added to regular DAT for certain hashes which was identified as the samples by labs team. Please find the recommendation below,
https://kc.mcafee.com/corporate/index?page=content&id=KB95707
And please do subscribe to the article to get notifications on the update on this coverage.
Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!
Knowledge Center - Coverage for CVE-2022-30190, Microsoft Windows Support Diagnostic Tool Remote Cod... doesn't mention an extra dat, or that this is covered in the regular AMCore update (so I assume it's not).
Where is the extra dat, and when will it be added to the regular AMCore content?
Hello @ChrisQ Thank you for your post. Please find the list of hashes in the attachment which was identified by the labs team that belongs to the latest Vulnerability [CVE-2022-30190] and initially an Extra Dat was provided for the coverage for those mentioned hashes and we have it covered in regular DAT now . However the recommendation for this vulnerability would be the below article,
https://kc.mcafee.com/corporate/index?page=content&id=KB95707
Please do subscribe the article for the updates regarding the coverage
Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!
is the dat file released?
Hello @Shamini . Thank you for your post. Please find the list of hashes in the attachment which was identified by the labs team that belongs to the latest Vulnerability [CVE-2022-30190] and initially an Extra Dat was provided for the coverage for those mentioned hashes and we have it covered in regular DAT now . However the recommendation for this vulnerability would be the below article,
https://kc.mcafee.com/corporate/index?page=content&id=KB95707
Please do subscribe the article for the updates regarding the coverage
Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!
What good are hashes going to do?! MSDT can be called and exploited from any MSDT URL... Hashes might block the current malicious executables in the wild that are taking advantage of this monumentally terrible attack vector, but it won't stop ALL malicious executables which one must assume will skyrocket, especially given that still no patch exists from Microsoft...
I concede I'm no expert, certainly not to the level of McAfee whose business is that of virus/malware prevention, and that none of this is McAfee's fault, but in my very humble opinion, the only true fix right now is to block all executions of msdt.exe. It is an executable not necessary for normal business functions.
Again, IMHO, being blocked from running a potentially helpful troubleshooting from Microsoft is an exceedingly small price to pay to block all attempts to use the same troubleshooting tool maliciously...
Again, that's just me, not trying to argue, do with my comments what you wish. Thank you for your time.
Hello @billmoller . Thank you for your post. Yes you are correct. Hash coverage done by McAfee ENS is only for those hashes which are tested with. However there are lot of recommendations other than the hashes [ Exploit Prevention Rule and the signatures , Access Protection Rules, Adaptive Threat Protection Rules] which is mentioned in the article below,
https://kc.mcafee.com/corporate/index?page=content&id=KB95707
And there is also a Work Around 2,
Microsoft Workaround:
Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability
Disable the MSDT URL Protocol:
Disabling MSDT URL protocol prevents troubleshooters being launched as links including links throughout the operating system. Troubleshooters can still be accessed using the Get Help application and in system settings as other or additional troubleshooters. Follow these steps to disable:
Undo the workaround:
Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!
Another reason to block msdt.exe entirely... DogWalk...
"Researchers Warn of Unpatched "DogWalk" Microsoft Windows Vulnerability"
"While all files downloaded and received via email include a Mark-of-the-Web (MOTW) tag that's used to determine their origin and trigger an appropriate security response, 0patch's Mitja Kolsek noted that the MSDT application is not designed to check this flag and hence allows the .diagcab file to be opened without warning."
{link is apparently prohibited by McAfee, so google: the hacker news dogwalk msdt}
It looks like Microsoft has released a patch for msdt (CVE-2022-30190 - Security Update Guide - Microsoft - Microsoft Windows Support Diagnostic Tool (MSDT...), and with my recommended mitigation in place, the upgrade will fail to install (access denied).
IMHO, I would [and have] disable[d]/delete[d] my workaround (to block all executions of msdt.exe) to allow the June 2022 MSFT patches to successfully install.
Thank you
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.
Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership: