Zero Days - Follina

I recently learned of actively exploited zero-days that seem high risk.

The zero-days bypass AntiVirus (AV) and User Access Control (UAC) protections by exploiting Windows built-in MSProtocol URI scheme.

Microsoft has yet to release patches, and the ease with which these exploits bypass known protections is alarming.

The scope of the attack surface is still being discovered as cybersecurity researchers attempt to test various schemas within the MSProtocol URI.

Users will have to manually modify the registry, backup, and delete entries to mitigate risks.

The following links highlight the issues more in-depth:

https://medium.com/doublepulsar/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e

Rapid Response: Microsoft Office RCE - “Follina” MSDT Attack
A new attack vector enables hackers to more easily compromise users with malicious Microsoft Office documents.
You've successfully subscribed to Amitk.io
Great! Next, complete checkout for full access to Amitk.io
Welcome back! You've successfully signed in.
Unable to sign you in. Please try again.
Success! Your account is fully activated, you now have access to all content.
Error! Stripe checkout failed.
Success! Your billing info is updated.
Error! Billing info update failed.