CVE REFERENCE | HIGH SEVERITY
Active ThreatJune 14, 20228 min read

CVE-2022-30190 Explained: Follina, the Zero-Click Microsoft Office RCE

A Microsoft Support Diagnostic Tool vulnerability triggered by opening or previewing a Word document. No macros. No user clicks. Full remote code execution from a weaponized .docx file — and no security bar warning.

Sources:Microsoft MSRC|nao_sec Research|CISA KEV|NIST NVD
Eric Bang
Eric Bang

Founder & Cybersecurity Evangelist

7.8
CVSS Score
0
Macro prompts required
Preview
Pane can trigger on some configs
2022
Patched June 14 Patch Tuesday

CVE-2022-30190, nicknamed Follina, was discovered by nao_sec researchers on May 27, 2022 and had already been exploited in the wild before discovery — samples date to April 2022.

The vulnerability abuses the ms-msdt:// URI scheme, a Windows protocol handler that launches the Microsoft Support Diagnostic Tool. A specially crafted Office document containing an external OLE template reference forces Word to fetch a malicious HTML file from an attacker-controlled server, which executes an ms-msdt:// URL that runs arbitrary PowerShell code.

What makes Follina uniquely dangerous: it requires no macros. Office documents with macro content display a yellow security bar requiring user acknowledgment. Follina uses OLE template references — a legitimate Office feature — which raises no such warning. On some Windows configurations, simply previewing the file in Windows Explorer's Preview Pane without opening it triggers the exploit.

How the Follina Exploit Chain Works

A malicious .docx file contains an OLE template relationship entry pointing to an external attacker-controlled URL instead of a local template file. When Word opens the document (or Windows Explorer generates a preview), Word fetches the external URL.

The attacker's server returns an HTML file containing a redirect to an ms-msdt:// URI. This URI invokes MSDT.exe with attacker-specified parameters, including an IT_BrowseForFile parameter embedding a PowerShell command. MSDT.exe executes this PowerShell command as the current user with no UAC prompt and no macro warning displayed.

1

Craft Malicious DOCX

Attacker creates a .docx file with an OLE template XML relationship pointing to an attacker-controlled HTTP URL instead of a local template.

2

Victim Opens or Previews Document

Victim opens the document in Word, or previews it in Windows Explorer. No macro warning is displayed — the file appears clean.

3

Word Fetches External Template

Word's template loading code fetches the external URL. The attacker's server returns an HTML file with the payload.

4

HTML Invokes ms-msdt:// URI

The HTML redirects to an ms-msdt:// URI with embedded PowerShell code in the IT_BrowseForFile parameter.

5

MSDT Executes PowerShell as Current User

Windows invokes MSDT.exe, which processes the URI and executes the embedded PowerShell command — achieving code execution with no further user interaction.

Patch and Mitigation for CVE-2022-30190

Microsoft patched Follina on June 14, 2022 as part of Patch Tuesday. Before the patch, Microsoft published a registry-based workaround to disable the ms-msdt:// protocol handler entirely.

Apply June 2022 Patch Tuesday updates

Install all June 14, 2022 cumulative updates for Windows. The patch modifies MSDT.exe to reject maliciously crafted IT_BrowseForFile URI parameters.

Disable ms-msdt protocol handler (pre-patch workaround)

Back up then delete the registry key HKEY_CLASSES_ROOT\ms-msdt to block ms-msdt:// invocations from any application: reg export HKEY_CLASSES_ROOT\ms-msdt backup.reg && reg delete HKEY_CLASSES_ROOT\ms-msdt /f

Disable Preview Pane in Windows Explorer

Eliminates the no-click attack surface. Apply via Group Policy: User Configuration > Administrative Templates > Windows Components > Windows Explorer > Turn off Windows+Tab hotkey.

Block external OLE template retrieval via ASR

Enable Microsoft Defender Attack Surface Reduction rule GUID 3b576869-a4ec-4529-8536-b80a7769e899 to block Office from fetching external OLE templates.

The bottom line

Follina proved that macro security controls — the industry's primary defense against malicious Office documents for two decades — do not cover all Office code execution paths. A legitimate template feature became a zero-click RCE vector. Apply the June 2022 patches, disable the ms-msdt protocol handler as defense-in-depth, and ensure Protected View is enforced and not bypassed by Group Policy exceptions.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

FollinaCVE-2022-30190MSDTMicrosoft OfficeRCEzero-click