Microsoft fixed several vulnerabilities in different Windows versions with the June Patch Day updates. However, the results of the initial analysis have shown that there is a zero-day vulnerability. Unpatched vulnerability is in Microsoft Diagnostic Tool. This vulnerability was discovered by DogWalk, a security researcher. This vulnerability information was not released until June 2022. The Security researcher Imrerad found the problem two years prior and reported it to Microsoft.
Follina was a problem with Microsoft’s Diagnostic Tool. Security authorities raised concerns that this vulnerability was being exploited. The zero-day vulnerability in DogWalk gained attention, but not from Microsoft. Follina was fixed in a patch day. DogWalk was not.
Follina vulnerability Fixed
Microsoft assessed Follina’s severity as “high” and recommended corrective action immediately. The June patches make the precautions redundant and permanent. Microsoft recommends that customers install the latest Windows updates as soon as possible to protect themselves against any vulnerability.
Bypass Path Vulnerability
Microsoft is seeing things differently with DogWalk. According to the Windows team, it didn’t require immediate action. There has yet been no assignment of a CPU. DogWalk exploits a vulnerability in path bypass that allows a payload to be placed in the Windows startup directory. This allows the injected malware to be run next time the user logs in to their system.