Blog
Microsoft’s CVE 2022 – 30190 Vulnerability: What to Do?
Microsoft recently reported a critical zero-day vulnerability (CVE 2022 – 30190) regarding the Microsoft Support Diagnostic Tool (MSDT), which at the time, required a temporary fix but is now being resolved with a patch update later this month.
If you’re currently a TSI managed client, this actively exploited vulnerability that enables threat actors to deploy malware into your environment and provide them access to your network was addressed, but if you’re not, it’s imperative that you bring this issue to your IT provider or IT team’s attention. Rest assured, the temporary solution should not negatively impact your organization’s systems’ performance or capabilities and until the permanent fix can be applied, we highly recommend looking into this ASAP. As always, we are keeping a close watch for any updates and will keep you informed as we learn more about this evolving threat. In the meantime, we’re here as an additional IT and cybersecurity resource so please don’t hesitate to reach out to us anytime for more information about this vulnerability- we’re here to help!
Get in Touch with TSI
For more information on Microsoft’s CVE 2022 - 30190 MDST vulnerability or If you have any questions or concerns, please do not hesitate to give us a call at 508-543-6979 or send us a message here to get started.
Categories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place