Follina vulnerability - reverse the workaround after JUNE 2022 patch?

David Moon 606 Reputation points
2022-06-15T03:11:30.077+00:00

Hi All

So it appears JUNE 2022 update covers the Follina vulnerability.
However i could not see anywhere about what is recommended with the previous workaround of deleting the registry key.
Once the client is patched with June 2022 update, would the recommendation be to reinstate the deleted registry keys from the workaround?

https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/

Thanks,
DM

Windows for business | Windows Client for IT Pros | Devices and deployment | Configure application groups
Windows for business | Windows Client for IT Pros | User experience | Other
0 comments No comments
{count} vote

2 answers

Sort by: Most helpful
  1. Limitless Technology 39,926 Reputation points
    2022-06-15T08:36:14.457+00:00

    Hi DavidMoon-1992,

    If you have implemented the workaround there will be no need to undo this workaround once the patch is installed.

    I hope this answers your question.

    ---------------------------------------------------------------------------------------------------------------------------------------------------

    --If the reply is helpful, please Upvote and Accept as answer--


  2. S.Sengupta 24,636 Reputation points MVP
    2022-07-10T04:32:17.897+00:00

    Delete the CertificateMappingMethods registry setting only after the June 14, 2022 update has been installed on all intermediate or application servers and all DCs.

    Ref:
    June 14, 2022—KB5014699

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.