一、基本情况
MSDT是Microsoft提供的一种工具,用于收集系统信息并将其发送回Microsoft支持部门以进行问题诊断,例如设备驱动程序、硬件等问题。此工具适用于所有版本的Windows,包括Windows Server OS。
二、影响范围:
目前受影响的Windows版本:
Windows Server 2012 R2
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit/x64-based Systems Service Pack 2
Windows RT 8.1
Windows 8.1 for 32-bit/x64-based systems
Windows 7 for 32-bit/x64-based Systems Service Pack 1
Windows Server 2016
Windows 10 Version 1607 for 32-bit/x64-based Systems
Windows 10 for 32-bit/x64-based Systems
Windows 10 Version 21H2 for 32-bit/ARM64-based/x64-based Systems
Windows 11 for x64-based/ARM64-based Systems
Windows 10 Version 20H2 for x64-based/32-bit/ARM64-based Systems
Windows Server 2022 Azure Edition Core Hotpatch
Windows Server 2022
Windows 10 Version 21H1 for x64-based/ARM64-based/32-bit Systems
Windows Server 2019
Windows 10 Version 1809 for 32-bit/x64-based/ARM64-based Systems
三、漏洞描述:
该漏洞存在于Microsoft支持诊断工具(MSDT)中,漏洞编号:CVE-2022-30190,漏洞等级:高危。
该漏洞是由于MSDT被用户应用使用URL协议调用,攻击者通过社会工程诱使受害者从网站下载并打开特制文件,最终获取用户权限。
四、解决方案:
当前官方已发布受影响版本的修复指南,修复详情如下:
https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/
修复建议参考《Windows MSDT 远程代码执行漏洞 CVE-2022-30190响应通告》
五、参考链接:
国家信息安全漏洞共享平台 (cnvd.org.cn)