近日,国家信息安全漏洞共享平台(CNVD)收录了微软支持诊断工具远程代码执行漏洞(CVE-2022-30190)。攻击者利用该漏洞,可在未授权的情况下远程执行代码。目前,漏洞利用代码已公开,且已出现在野利用的情况。
一、漏洞情况分析
微软支持诊断工具(MSDT,Microsoft Support Diagnostic Tool)是一种实用程序,用于排除故障并收集诊断数据,供专业人员分析和解决问题。未经身份验证的攻击者利用该远程代码执行漏洞(CVE-2022-30190),诱使用户直接访问或者预览恶意的Office文档,通过恶意Office文档中的远程模板功能,从服务器获取包含恶意代码的HTML文件并执行,从而实现以当前用户权限下的任意代码执行攻击。该漏洞已知触发需要用户对恶意Office文档进行直接访问,或者在资源管理器中通过预览选项卡对RTF格式的恶意文档进行预览。CNVD对该漏洞的综合评级为“高危”。
二、漏洞影响范围
漏洞影响的产品版本包括:
Windows Server 2012 R2 (Server Coreinstallation) Windows Server 2012 R2 Windows Server 2012 (Server Coreinstallation) Windows Server 2012 Windows Server 2008 R2 for x64-basedSystems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-basedSystems Service Pack 1 Windows Server 2008 for x64-basedSystems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-basedSystems Service Pack 2 Windows Server 2008 for 32-bit SystemsService Pack 2 (Server Core installation) Windows Server 2008 for 32-bit SystemsService Pack 2 Windows RT 8.1 Windows 8.1 for x64-based systems Windows 8.1 for 32-bit systems Windows 7 for x64-based Systems ServicePack 1 Windows 7 for 32-bit Systems ServicePack 1 Windows Server 2016 (Server Coreinstallation) Windows Server 2016 Windows 10 Version 1607 for x64-basedSystems Windows 10 Version 1607 for 32-bitSystems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 21H2 for x64-basedSystems Windows 10 Version 21H2 for ARM64-basedSystems Windows 10 Version 21H2 for 32-bitSystems Windows 11 for ARM64-based Systems Windows 11 for x64-based Systems Windows Server, version 20H2 (ServerCore Installation) Windows 10 Version 20H2 for ARM64-basedSystems Windows 10 Version 20H2 for 32-bitSystems Windows 10 Version 20H2 for x64-basedSystems Windows Server 2022 Azure Edition Core Hotpatch Windows Server 2022 (Server Core installation) Windows Server 2022 Windows 10 Version 21H1 for 32-bitSystems Windows 10 Version 21H1 for ARM64-basedSystems Windows 10 Version 21H1 for x64-basedSystems Windows Server 2019 (Server Coreinstallation) Windows Server 2019 Windows 10 Version 1809 for ARM64-basedSystems Windows 10 Version 1809 for x64-basedSystems Windows 10 Version 1809 for 32-bitSystems |
三、漏洞处置建议
请持续关注微软公司发布的安全公告,及时参照官方指导采取缓解措施或安装补丁,请各单位强化风险意识,尽快排查是否部署了受影响的相关产品,做好风险防范,以免发生安全事件。