Patch
CVE-2022-30190
with vRx
Vulnerability Overview
CVE Name
CVE-2022-30190
Severity
7.8
High
CVE Description
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application....
Show more
Show less
Latest Patch info
Patch Name
N/A
Date
01.06.2022
Script

Script Type
Remediation script
The Following powershell script disables the msdt url protocol, which is responsible for the Support diagnostic Tool. This is done to prevent and mitigate a remote code execution (RCE) vulnerability known as CVE-2022-30190 (Follina) by deleting the registry key of HKEY_CLASSES_ROOT\ms-msdt and forcing it to stop in case it running in the system and taking a backup if it needs a restore
Read more
Read less
Affected OS & Apps
Windows 10 21H2
by
Microsoft
Windows 10 1607
by
Microsoft
Windows 10 1507
by
Microsoft
Show more
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Patch faster and better with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.