Posted on Leave a comment

Zero-Day: Follina vulnerability affecting Microsoft Office products

A zero-day exploit vulnerability is affecting Microsoft Office products, disable Microsoft Diagnostic Tool’s URL Protocol now!

The flaw allows URL execution from word documents even in a protected view, according to the TechLinked video.

There is no patch yet, and Microsoft advises disabling the MSDT URL Protocol. Instructions below.

In-depth video discussing Follina, here.

Workaround

To disable the MSDT URL Protocol

Disabling MSDT URL protocol prevents troubleshooters being launched as links including links throughout the operating system. Troubleshooters can still be accessed using the Get Help application and in system settings as other or additional troubleshooters. Follow these steps to disable:

  1. Run Command Prompt as Administrator.
  2. To back up the registry key, execute the command “reg export HKEY_CLASSES_ROOT\ms-msdt filename
  3. Execute the command “reg delete HKEY_CLASSES_ROOT\ms-msdt /f”.

How to undo the workaround

  1. Run Command Prompt as Administrator.
  2. To restore the registry key, execute the command “reg import filename” 

Get protection!

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.