Microsoft Confirms ‘Follina ’ vulnerability inMicrosoft Office - Researchers suggest that the Follina
zero-day vulnerability has also impacted Office 2013 version. - Instead of a security patch, Microsoft has released guidance to cope with Follina - read below.
The Tokyo based cybersecurity research organization revealed the Follina vulnerability on their Twitter handle. According to the tweet, the security lapse is allowing Microsoft Word file to execute code - Follina even if Macros is disabled as it is used to give commands for automated tasks. Meanwhile, hackers are using vulnerability for similar automation with Macros.
On Monday, Microsoft Security Response Center responded on Office vulnerabilities and said, if a hacker exploits this vulnerability, they can install programs or applications and exploit, view or delete data. Further, they can also create new accounts using ‘user rights’ and personal information.
Earlier, Microsoft Office versions 2013 and 2021 have been found vulnerable to attacks. In some cases even licensed versions of Microsoft 365 were also affected on Windows 10 and 11.
Researcher and former Senior Threat Intelligence Analyst at Microsoft,
No security update or patch is available for Follina
According to Microsoft, currently, no patch is available. Instead, the company’s security response centre team has released a set of guidelines to cope with Follina.
Company says, the best way to cope with this vulnerability is to disable the Microsoft Support Diagnostics Tool (MSDT) URL protocol.
Follow the given steps to disable MSDT-
- Switch to Administrator and run Command Prompt.
- Execute command ‘reg export HKEY_CLASSES_ROOT\ms-msdt filename’ to back up the registry key.
SEE ALSO:
Apple’s new patent may use ultrasonic haptic technology to make virtual reality more realistic
Amazon employees storm a company Pride Month celebration, protesting the sale of transphobic content