MS Office Vulnerability

At the end of May 2022, a vulnerability in the Microsoft Office environment became known that can be exploited via prepared Office documents - So called MS-MSDT vulnerability. Windows systems can be compromised in this way.

In order to prevent the exploitation of this vulnerability, IT has decided in consultation with D4 to follow Microsoft's recommendation to remove the local Windows registry entry HKEY_CLASSES_ROOT\ms-msdt from all DESY Windows computers in the domain using a corresponding group policy. The updated policy is active since 01.06.2022 afternoon.

This change is not expected to have any adverse effect on the use of the affected computers.

Devices at Home Office

Users who work from home should connect their DESY device via VPN and leave it connected for several hours.

If only a short-term VPN connection is possible, the following command must be executed via the command line (cmd), after the VPN connection has been established, in order to force the change: gpupdate /force

Devices outside of the Domain

For Windows computers that are not part of the domain, it is strongly recommended that you also delete the above Windows Registry Key and do this manually according to Microsoft's recommendation. You can find instructions on how to do this on the following website:

https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/