CVE-2022-30190

HIGH KEV RANSOMWARE

Microsoft Office Word MSDTJS

Title source: metasploit

Description

A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.

Exploits (93)

nomisec WORKING POC 394 stars
by komomon · client-side
https://github.com/komomon/CVE-2022-30190-follina-Office-MSDT-Fixed
nomisec WORKING POC 158 stars
by JMousqueton · client-side
https://github.com/JMousqueton/PoC-CVE-2022-30190
nomisec WORKING POC 104 stars
by onecloudemoji · client-side
https://github.com/onecloudemoji/CVE-2022-30190
nomisec WORKING POC 60 stars
by doocop · poc
https://github.com/doocop/CVE-2022-30190
nomisec WORKING POC 38 stars
by Malwareman007 · client-side
https://github.com/Malwareman007/Deathnote
nomisec WRITEUP 38 stars
by archanchoudhury · poc
https://github.com/archanchoudhury/MSDT_CVE-2022-30190
nomisec WORKING POC 33 stars
by Hrishikesh7665 · client-side
https://github.com/Hrishikesh7665/Follina_Exploiter_CLI
nomisec WORKING POC 31 stars
by MalwareTech · poc
https://github.com/MalwareTech/FollinaExtractor
nomisec SCANNER 23 stars
by ErrorNoInternet · poc
https://github.com/ErrorNoInternet/FollinaScanner
nomisec WORKING POC 22 stars
by Noxtal · client-side
https://github.com/Noxtal/follina
nomisec WORKING POC 20 stars
by 0xflagplz · poc
https://github.com/0xflagplz/MS-MSDT-Office-RCE-Follina
nomisec WORKING POC 18 stars
by dwisiswant0 · poc
https://github.com/dwisiswant0/gollina
nomisec WORKING POC 10 stars
by aminetitrofine · client-side
https://github.com/aminetitrofine/CVE-2022-30190
nomisec WORKING POC 8 stars
by Gra3s · client-side
https://github.com/Gra3s/CVE-2022-30190_EXP_PowerPoint
nomisec WORKING POC 8 stars
by ar2o3 · poc
https://github.com/ar2o3/FollinaXploit
nomisec WORKING POC 8 stars
by drgreenthumb93 · poc
https://github.com/drgreenthumb93/CVE-2022-30190-follina
nomisec WORKING POC 7 stars
by DerZiad · client-side
https://github.com/DerZiad/CVE-2022-30190
nomisec WORKING POC 7 stars
by sudoaza · client-side
https://github.com/sudoaza/CVE-2022-30190
nomisec WORKING POC 6 stars
by PaddlingCode · poc
https://github.com/PaddlingCode/cve-2022-30190
nomisec WORKING POC 6 stars
by ItsNee · poc
https://github.com/ItsNee/Follina-CVE-2022-30190-POC
nomisec WORKING POC 5 stars
by Cosmo121 · poc
https://github.com/Cosmo121/Follina-Remediation
nomisec WORKING POC 5 stars
by AbdulRKB · poc
https://github.com/AbdulRKB/Follina
nomisec WRITEUP 4 stars
by sentinelblue · poc
https://github.com/sentinelblue/CVE-2022-30190
nomisec WORKING POC 4 stars
by dsibilio · poc
https://github.com/dsibilio/follina-spring
nomisec SCANNER 3 stars
by EkamSinghWalia · poc
https://github.com/EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-
nomisec WORKING POC 3 stars
by SrikeshMaharaj · poc
https://github.com/SrikeshMaharaj/CVE-2022-30190
nomisec WORKING POC 3 stars
by rouben · poc
https://github.com/rouben/CVE-2022-30190-NSIS
nomisec WORKING POC 2 stars
by winstxnhdw · client-side
https://github.com/winstxnhdw/CVE-2022-30190
nomisec STUB 2 stars
by arozx · client-side
https://github.com/arozx/CVE-2022-30190
nomisec WORKING POC 2 stars
by amitniz · poc
https://github.com/amitniz/follina_cve_2022-30190
nomisec WRITEUP 2 stars
by gyaansastra · poc
https://github.com/gyaansastra/CVE-2022-30190
nomisec NO CODE 2 stars
by swaiist · poc
https://github.com/swaiist/CVE-2022-30190-Fix
nomisec WORKING POC 2 stars
by Zitchev · client-side
https://github.com/Zitchev/go_follina
nomisec WRITEUP 2 stars
by gamingwithevets · poc
https://github.com/gamingwithevets/msdt-disable
nomisec WORKING POC 2 stars
by suenerve · poc
https://github.com/suenerve/CVE-2022-30190-Follina-Patch
nomisec WORKING POC 2 stars
by jeffreybxu · poc
https://github.com/jeffreybxu/five-nights-at-follina-s
nomisec WRITEUP 2 stars
by SonicWave21 · poc
https://github.com/SonicWave21/Follina-CVE-2022-30190-Unofficial-patch
nomisec WORKING POC 1 stars
by hycheng15 · client-side
https://github.com/hycheng15/CVE-2022-30190
nomisec WORKING POC 1 stars
by derco0n · poc
https://github.com/derco0n/mitigate-folina
nomisec WORKING POC 1 stars
by IamVSM · poc
https://github.com/IamVSM/msdt-follina
nomisec WRITEUP 1 stars
by rickhenderson · poc
https://github.com/rickhenderson/cve-2022-30190
nomisec WORKING POC 1 stars
by alienkeric · poc
https://github.com/alienkeric/CVE-2022-30190
nomisec WORKING POC 1 stars
by joshuavanderpoll · poc
https://github.com/joshuavanderpoll/CVE-2022-30190
nomisec WORKING POC 1 stars
by ITMarcin2211 · client-side
https://github.com/ITMarcin2211/CVE-2022-30190
nomisec WORKING POC 1 stars
by melting0256 · client-side
https://github.com/melting0256/Enterprise-Cybersecurity
nomisec WORKING POC 1 stars
by ToxicEnvelope · local
https://github.com/ToxicEnvelope/FOLLINA-CVE-2022-30190
nomisec WORKING POC 1 stars
by Muhammad-Ali007 · client-side
https://github.com/Muhammad-Ali007/Follina_MSDT_CVE-2022-30190
nomisec WORKING POC 1 stars
by Jump-Wang-111 · client-side
https://github.com/Jump-Wang-111/AmzWord
nomisec WRITEUP 1 stars
by kdk2933 · poc
https://github.com/kdk2933/msdt-CVE-2022-30190
nomisec WRITEUP 1 stars
by b401 · poc
https://github.com/b401/Clickstudio-compromised-certificate
nomisec WORKING POC 1 stars
by michealadams30 · poc
https://github.com/michealadams30/Cve-2022-30190
nomisec STUB
by mitespsoc · poc
https://github.com/mitespsoc/CVE-2022-30190-POC
nomisec WRITEUP
by nimesh895 · poc
https://github.com/nimesh895/Malware-Analysis-Follina-CVE-2022-30190
nomisec WORKING POC
by 2867a0 · poc
https://github.com/2867a0/CVE-2022-30190
nomisec WRITEUP
by nanaao · poc
https://github.com/nanaao/PicusSecurity4.Week.Repo
nomisec WORKING POC
by cyberdashy · poc
https://github.com/cyberdashy/CVE-2022-30190
nomisec WRITEUP
by yeep1115 · poc
https://github.com/yeep1115/ICT287_CVE-2022-30190_Exploit
nomisec WRITEUP
by yrkuo · local
https://github.com/yrkuo/CVE-2022-30190
nomisec NO CODE
by rayorole · poc
https://github.com/rayorole/CVE-2022-30190
nomisec WORKING POC
by Nyx2022 · poc
https://github.com/Nyx2022/Follina-CVE-2022-30190-Sample
nomisec WRITEUP
by abhirules27 · poc
https://github.com/abhirules27/Follina
nomisec WORKING POC
by JotaQC · poc
https://github.com/JotaQC/CVE-2022-30190_Temporary_Fix
nomisec SCANNER
by ernestak · poc
https://github.com/ernestak/Sigma-Rule-for-CVE-2022-30190
nomisec NO CODE
by Potato-9257 · client-side
https://github.com/Potato-9257/CVE-2022-30190_page
nomisec WRITEUP
by seinab-ibrahim · poc
https://github.com/seinab-ibrahim/Follina-Vulnerability-CVE-2022-30190-Exploit-Analysis
nomisec WORKING POC
by notherealhazard · poc
https://github.com/notherealhazard/follina-CVE-2022-30190
nomisec WORKING POC
by Cerebrovinny · poc
https://github.com/Cerebrovinny/follina-CVE-2022-30190
nomisec WORKING POC
by Imeneallouche · client-side
https://github.com/Imeneallouche/Follina-attack-CVE-2022-30190-
nomisec WORKING POC
by sentrium-security · poc
https://github.com/sentrium-security/Follina-Workaround-CVE-2022-30190
nomisec WORKING POC
by hilt86 · poc
https://github.com/hilt86/cve-2022-30190-mitigate
nomisec WORKING POC
by ethicalblue · local
https://github.com/ethicalblue/Follina-CVE-2022-30190-Sample
nomisec WRITEUP
by RathoreAbhiii · poc
https://github.com/RathoreAbhiii/Folina-Vulnerability-Exploitation-Detection-and-Mitigation
nomisec STUB
by mattjmillner · poc
https://github.com/mattjmillner/CVE-Smackdown
nomisec NO CODE
by tej7gandhi · poc
https://github.com/tej7gandhi/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt
nomisec WRITEUP
by ernestak · poc
https://github.com/ernestak/CVE-2022-30190
nomisec WRITEUP
by Abdibimantara · poc
https://github.com/Abdibimantara/CVE-2022-30190-Analysis-With-LetsDefends-Lab
nomisec NO CODE
by Vaisakhkm2625 · poc
https://github.com/Vaisakhkm2625/MSDT-0-Day-CVE-2022-30190-Poc
nomisec NO CODE
by ImproveCybersecurityJaro · poc
https://github.com/ImproveCybersecurityJaro/2022_PoC-MSDT-Follina-CVE-2022-30190
nomisec NO CODE
by droidrzrlover · poc
https://github.com/droidrzrlover/CVE-2022-30190
nomisec NO CODE
by DOV3Y · poc
https://github.com/DOV3Y/CVE-2022-30190-ASR-Senintel-Process-Pickup
github WRITEUP
by OscarYR · poc
https://github.com/OscarYR/CVE_Reproduction/tree/main/Follina/CVE-2022-30190.md
nomisec NO CODE
by bcarrulo · poc
https://github.com/bcarrulo/Lab-CVE-2022-30190
nomisec WRITEUP
by aymankhder · poc
https://github.com/aymankhder/MSDT_CVE-2022-30190-follina-
nomisec WORKING POC
by hscorpion · poc
https://github.com/hscorpion/CVE-2022-30190
nomisec WRITEUP
by castlesmadeofsand · poc
https://github.com/castlesmadeofsand/ms-msdt-vulnerability-pdq-package
nomisec WORKING POC
by JotaQC · poc
https://github.com/JotaQC/CVE-2022-30190_Temporary_Fix_Source_Code
nomisec WORKING POC
by WesyHub · poc
https://github.com/WesyHub/CVE-2022-30190---Follina---Poc-Exploit
nomisec SCANNER
by XxToxicScriptxX · poc
https://github.com/XxToxicScriptxX/CVE-2022-30190
nomisec SCANNER
by shri142 · poc
https://github.com/shri142/ZipScan
nomisec WRITEUP
by Arkha-Corvus · poc
https://github.com/Arkha-Corvus/LetsDefend-SOC173-Follina-0-Day-Detected
patchapalooza WORKING POC
by 0xAbbarhSF · client-side
https://github.com/0xAbbarhSF/FollinaXploit
metasploit WORKING POC EXCELLENT
by nao sec, mekhalleh (RAMELLA Sébastien), bwatters-r7 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/word_msdtjs_rce.rb
patchapalooza WORKING POC
by alien-keric · client-side
https://github.com/alien-keric/CVE-2022-30190

Scores

CVSS v3 7.8
EPSS 0.9353
EPSS Percentile 99.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-06-14
VulnCheck KEV 2022-05-30
InTheWild.io 2022-05-27
ENISA EUVD EUVD-2022-35396
Ransomware Use Confirmed

Classification

Status published

Affected Products (17)

microsoft/windows_10_1507 < 10.0.10240.19325
microsoft/windows_10_1607 < 10.0.14393.5192
microsoft/windows_10_1809 < 10.0.17763.3046
microsoft/windows_10_20h2 < 10.0.19042.1766
microsoft/windows_10_21h1 < 10.0.19043.1766
microsoft/windows_10_21h2 < 10.0.19044.1766
microsoft/windows_11_21h2 < 10.0.22000.739
microsoft/windows_7
microsoft/windows_8.1
microsoft/windows_rt_8.1
microsoft/windows_server_2008
microsoft/windows_server_2012
microsoft/windows_server_2012
microsoft/windows_server_2016 < 10.0.14393.5192
microsoft/windows_server_2019 < 10.0.17763.3046
... and 2 more

Timeline

Published Jun 01, 2022
KEV Added Jun 14, 2022
Tracked Since Feb 18, 2026