← Back to all briefings
Cybersecurity 5 min read Published Updated Credibility 40/100

Cybersecurity Briefing — Microsoft patches Follina MSDT RCE (CVE-2022-30190)

Microsoft’s 14 June 2022 Patch Tuesday shipped fixes for the widely exploited Follina MSDT remote code execution flaw (CVE-2022-30190) affecting Office documents, closing a zero-click infection vector used by state-linked threat actors.

Single-point timeline showing the publication date sized by credibility score.
Publication date and credibility emphasis for this briefing. Source data (JSON)

On 14 June 2022 Microsoft released security updates for CVE-2022-30190, the “Follina” Microsoft Support Diagnostic Tool (MSDT) vulnerability abused via malicious Office documents. The flaw allowed crafted URLs to execute PowerShell through MSDT without macros, enabling remote code execution when users opened or previewed files. Threat intelligence reported exploitation by APT groups targeting government and media organizations prior to the patch.

Organizations should deploy the June cumulative updates, validate that Office applications block MSDT invocation, and monitor for lingering indicators such as ms-msdt process calls from Office executables. Disabling the MSDT URL protocol handler and tightening attachment sandboxing remain prudent defense-in-depth steps alongside vulnerability scanning to confirm patch coverage.

Single-point timeline showing the publication date sized by credibility score.
Publication date and credibility emphasis for this briefing. Source data (JSON)

Continue in the Cybersecurity pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

  • Vulnerability Management
  • Endpoint Security
  • Patch Management
Back to curated briefings