Remote Code Execution: A Major Threat to Data Loss

Remote Code Execution: A Major Threat to Data Loss

Sanskar Raizada, Likshit Girish Matwani, Yudhveer Singh
DOI: 10.4018/978-1-6684-5871-6.ch012
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75

Abstract

Data needs to be protected first and foremost these days. The biggest threat to any organization is when someone has access to its data, credentials, or sensitive information. Every firm is establishing its services online as we move toward a digital future, and for those services, data loss, disruption, or corruption pose a serious hazard . Web apps are becoming more and more popular because of their ability to meet both consumer and commercial needs. The most effective and efficient way to deliver business services to stakeholders is now possible with web applications. Many services are now offered through web apps, and the efficiency of those services is gauged by the speed at which they are processed and their informational capabilities. However, because of incorrect validation, those services may also be threatened. Currently, cyber-attacks are a serious concern for any global digital transition. This chapter presents a case study on a critical criteria vulnerability named RCE.
Chapter Preview
Top

Ii. Follina (Cve-2022-30190)

Remote code execution is a critical vulnerability that has been found recently in Microsoft’s zero-day vulnerability named Follina as a main key algorithm, on 30 May 2022, Microsoft issued CVE-2022-30190 regarding Microsoft Support diagnostic Tool in Windows Vulnerability (Stepankin, 2015). The Microsoft Support Diagnostic Tool will be discussed first. Information is gathered and sent to Microsoft Support using the Microsoft Support Diagnostic Tool. After reviewing this data, Microsoft support decides how to fix any issues you might be having with your machine. When MSDT is contacted through the URL protocol from a calling program like word, it is possible for remote code execution to occur, according to a new zero-day vulnerability that Microsoft has disclosed (Shcherbakov & Musard, 2021).

If the vulnerability is successfully exploited, an attacker might execute any code with the caller application's permissions. In the context permitted by the user's privileges, the attacker can then install applications, read, modify, remove the data, or create new accounts.

Figure 1.

Follina vulnerability Methodology

978-1-6684-5871-6.ch012.f01

Complete Chapter List

Search this Book:
Reset