Heimdal Security Blog

SECURITY ALERT:  Zero-Day Microsoft Support Diagnostic Tool Vulnerability CVE-2022-30190 Enables Remote Code Execution

On Monday, Microsoft’s Security Response Center issued an advisory on CVE-2022-30190, a newly-discovered zero-day vulnerability that may enable threat actors to run arbitrary code with user-type rights. According to the note, the vulnerability is related to the in-app calling of MSDT (Microsoft Support Diagnostic Tool) via an URL protocol. Microsoft is currently working on a permanent fix, but no timeline has been made available. In the meantime, Microsoft advises users to implement workarounds.

What is CVE-2022-30190?

CVE-2022-30190 is a remote code execution vulnerability found to affect hosts that call upon MSDT from applications such as Word or Excel. Upon interaction, the user will get redirected to MS’s Support via an URL protocol. During data transmission, an interceding threat actor could obtain local user privileges in order to run malicious arbitrary code on the host machine.

Furthermore, according to Microsoft, if successfully exploited, the vulnerability would grant an attacker the same type of privileges (e.g., delete data, modify data, view data, or create a new account) as the ‘calling’ application. To date, there’s no official fix to the MSDT vulnerability. Microsoft has made available several workarounds; temporary fixes that can prevent in-application calling.

 Accessible Workaround(s)

Per Microsoft’s advisory, disabling the MSDT URL protocol has proven to be the most effective workaround. To disable the said protocol, please follow these steps.

Step 1. Run Command Prompt as Administrator.

Step 2. Back up the MSDT registry key. Type in or paste the following command:

reg export HKEY_CLASSES_ROOT\ms-msdt filename” (ignore the double inverted commas)

Step 3. Delete the MSDT registry key. Please type in or paste the following command to delete the registry key:

“reg delete HKEY_CLASSES_ROOT\ms-msdt /f” (ignore the double inverted commas).

The modification can be undone by running CMD with admin privileges and typing in

“reg import filename”

Another workaround would be to get support either by using the Get Help application or any other type of troubleshooter.

Additional Cybersecurity Advice

While waiting for the official Microsoft fix, you may want to try out some of these tips in order to safeguard your machines against CVE-2022-30190.

If you liked this article, follow us on LinkedInTwitterFacebookYoutube, and Instagram for more cybersecurity news and topics.