Skip to main content

Beware of emails with file attachments! There is a zero-day vulnerability that allows malicious code to be downloaded and executed via Word documents. There is not yet an official update to close the security gap.

Folina vulnerability

The German Federal Office for Information Security (BSI) warns of the Folina vulnerability, which could allow an attacker to download an HTML file from the internet using a prepared Word file. This is made possible by the remote template function contained in Microsoft Office. This can be misused for the further execution of PowerShell code. This could allow the attacker to install programmes, display, change or delete data.

Affected versions

It appears to affect Office products 2013, 2016, 2019, 2021 and 365 under Windows 10 and Windows 11 in conjunction with the Microsoft Support Diagnostic Tool (MSDT).

 

How to protect yourself

Be suspicious of senders you think you know. If you notice a difference between the displayed sender name and the sender address, this is a clear indication of a spam e-mail. Always be careful with file attachments in e-mails (especially Office documents). If in doubt, contact the sender by telephone.

Only open Office documents from trustworthy sources. Be particularly careful with documents in RTF format, as the malicious code can already be executed via the preview in Windows Explorer.

Do you have any questions about emails or IT security? Then please contact the IT Service Desk by email at servicedesk [at] tu-freiberg [dot] de or by telephone on 1818.

Workaround: Deactivate MSDT

As a workaround, Microsoft recommends deactivating the "Microsoft Support Diagnostic Tool" (MSDT).

Note: This is not a final security solution!

Further information

Contact us

IT Service Desk
University Computer Centre, Bernhard-von-Cotta-Str. 1, 09599 Freiberg
servicedesk [at] tu-freiberg.de +49 3731 39-1818