We would like to bring your attention to the following 0-day exploit we have recently become aware of.
Follina – A zero-day Microsoft Office code execution vulnerability that bypasses Microsoft Defender for Endpoint. This vulnerability has been seen to be actively exploited in the wild.
Update: Official Patches have been released
Additional mitigation advice has been released by Microsoft. An official patch has now been released and is available in the June 2022 cumulative Windows updates. Alternatively, stand alone versions are accessible from the following URL:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190
Description
This exploit uses the Microsoft Word remote template feature to retrieve a HTML file from a remote webserver. The powershell script that is executed utilises ‘msdt.exe’ (Microsoft’s Diagnostic Troubleshooting Wizard – a support tool to aid in troubleshooting), which is executed even if macros are disabled. If the document is saved in RTF format the code will run without even opening the file via the explorer preview tab.
Affected Versions
Office 2013
Office 2016
(There is the potential that later versions are affected, more work is needed before all affected versions are identified.)
Remediation
A Defender for Endpoint query has been written for companies that have the relevant Microsoft package (E5).
DeviceProcessEvents| where ProcessCommandLine contains “msdt.exe”| where InitiatingProcessFileName has_any (@”WINWORD.EXE”, @”EXCEL.EXE”, @”OUTLOOK.EXE”)
At this time there are no specific official patches available, CovertSwarm would advise increased vigilance to be taken in all attached word files into the company.
References:
-
https://medium.com/doublepulsar/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e
Handala & MuddyWater: MDM Weaponization at Enterprise Scale
On 11 March 2026, an Iranian two-team operation destroyed 200,000 enterprise devices at Stryker without deploying a single piece of malware. One compromised Global Administrator account.…
Why Robbing Banks Is Easy (And Why That Should Terrify You)
A globally recognized ethical hacker shares real social engineering stories from legally robbing banks across five continents. The tools change. The human vulnerabilities don’t.
Swarm Intelligence: Stryker’s Intune wipe proves your BCDR plan has a single point of failure
No malware. No ransomware. One compromised Global Admin account and the management console your IT team used this morning. The Stryker incident proves that when the…