CVE-2022-30190 PUBLISHED

Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability

Assigner: microsoft
Reserved: 03.05.2022 Published: 01.06.2022 Updated: 30.07.2025

A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
CVSS Score: 7.8

Product Status

Vendor Microsoft
Product Windows 10 Version 1809
Versions
  • affected from 10.0.17763.0 to 10.0.17763.3046 (excl.)
Vendor Microsoft
Product Windows 10 Version 1809
Versions
  • affected from 10.0.0 to 10.0.17763.3046 (excl.)
Vendor Microsoft
Product Windows Server 2019
Versions
  • affected from 10.0.17763.0 to 10.0.17763.3046 (excl.)
Vendor Microsoft
Product Windows Server 2019 (Server Core installation)
Versions
  • affected from 10.0.17763.0 to 10.0.17763.3046 (excl.)
Vendor Microsoft
Product Windows 10 Version 21H1
Versions
  • affected from 10.0.0 to 10.0.19043.1766 (excl.)
Vendor Microsoft
Product Windows Server 2022
Versions
  • affected from 10.0.20348.0 to 10.0.20348.770 (excl.)
Vendor Microsoft
Product Windows 10 Version 20H2
Versions
  • affected from 10.0.0 to 10.0.19042.1766 (excl.)
Vendor Microsoft
Product Windows Server version 20H2
Versions
  • affected from 10.0.0 to 10.0.19042.1766 (excl.)
Vendor Microsoft
Product Windows 11 version 21H2
Versions
  • affected from 10.0.0 to 10.0.22000.739 (excl.)
Vendor Microsoft
Product Windows 10 Version 21H2
Versions
  • affected from 10.0.19043.0 to 10.0.19044.1766 (excl.)
Vendor Microsoft
Product Windows 10 Version 1507
Versions
  • affected from 10.0.10240.0 to 10.0.10240.19325 (excl.)
Vendor Microsoft
Product Windows 10 Version 1607
Versions
  • affected from 10.0.14393.0 to 10.0.14393.5192 (excl.)
Vendor Microsoft
Product Windows Server 2016
Versions
  • affected from 10.0.14393.0 to 10.0.14393.5192 (excl.)
Vendor Microsoft
Product Windows Server 2016 (Server Core installation)
Versions
  • affected from 10.0.14393.0 to 10.0.14393.5192 (excl.)
Vendor Microsoft
Product Windows 7
Versions
  • affected from 6.1.0 to 6.1.7601.25984 (excl.)
Vendor Microsoft
Product Windows 7 Service Pack 1
Versions
  • affected from 6.1.0 to 6.1.7601.25984 (excl.)
Vendor Microsoft
Product Windows 8.1
Versions
  • affected from 6.3.0 to 6.3.9600.20402 (excl.)
Vendor Microsoft
Product Windows Server 2008 R2 Service Pack 1
Versions
  • affected from 6.1.7601.0 to 6.1.7601.25984 (excl.)
Vendor Microsoft
Product Windows Server 2008 R2 Service Pack 1 (Server Core installation)
Versions
  • affected from 6.1.7601.0 to 6.1.7601.25984 (excl.)
Vendor Microsoft
Product Windows Server 2012
Versions
  • affected from 6.2.9200.0 to 6.2.9200.23736 (excl.)
Vendor Microsoft
Product Windows Server 2012 (Server Core installation)
Versions
  • affected from 6.2.9200.0 to 6.2.9200.23736 (excl.)
Vendor Microsoft
Product Windows Server 2012 R2
Versions
  • affected from 6.3.9600.0 to 6.3.9600.20402 (excl.)
Vendor Microsoft
Product Windows Server 2012 R2 (Server Core installation)
Versions
  • affected from 6.3.9600.0 to 6.3.9600.20402 (excl.)

References

Problem Types