CVE-2022-34713 Overview
CVE-2022-34713 is a remote code execution vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT). This vulnerability, commonly referred to as "DogWalk," allows an attacker to execute arbitrary code on a target system by convincing a user to open a specially crafted file. The vulnerability exists due to improper handling of diagnostic packages by MSDT, enabling attackers to plant malicious executables in the Windows Startup folder that execute upon system reboot.
Critical Impact
This vulnerability is actively exploited in the wild and has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog, requiring immediate patching attention across all affected Windows systems.
Affected Products
- Microsoft Windows 10 (versions 1507, 1607, 1809, 20H2, 21H1, 21H2)
- Microsoft Windows 11 21H2
- Microsoft Windows 7 SP1, Windows 8.1, Windows RT 8.1
- Microsoft Windows Server 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, 2022, 20H2
Discovery Timeline
- August 9, 2022 - CVE-2022-34713 published to NVD
- October 30, 2025 - Last updated in NVD database
Technical Details for CVE-2022-34713
Vulnerability Analysis
The Microsoft Windows Support Diagnostic Tool (MSDT) vulnerability stems from how the tool processes diagnostic packages (.diagcab files). When a user opens a malicious diagnostic package, MSDT can be manipulated to copy an attacker-controlled payload to the Windows Startup folder. This payload then executes automatically when the user logs in to the system, providing the attacker with persistent code execution capabilities.
This vulnerability is particularly dangerous because it bypasses several security mechanisms. The attack requires user interaction (opening the malicious file), but once executed, it establishes persistence without requiring elevated privileges. The vulnerability affects a wide range of Windows versions, from legacy Windows 7 systems through to modern Windows 11 and Server 2022 installations.
Root Cause
The root cause of CVE-2022-34713 lies in insufficient validation of diagnostic package contents within MSDT. The tool fails to properly restrict where files can be extracted during diagnostic package processing, allowing path traversal techniques to place executables in sensitive system locations such as the Windows Startup folder (%AppData%\Microsoft\Windows\Start Menu\Programs\Startup).
Attack Vector
The attack vector requires local access with user interaction. An attacker must convince a victim to open a specially crafted .diagcab file, which can be delivered via:
- Phishing emails with malicious attachments
- Compromised websites hosting the malicious diagnostic package
- Social engineering tactics to trick users into downloading and opening the file
- USB drives or other removable media in targeted attacks
Once the victim opens the malicious diagnostic package, the payload is silently copied to the Startup folder and executes upon the next user login, establishing persistence on the compromised system.
The exploitation flow involves crafting a diagnostic package that contains a malicious executable and leverages path traversal to extract it to the Windows Startup directory. When processed by MSDT, the tool does not adequately validate file extraction paths, allowing the attacker to escape the intended extraction directory.
Detection Methods for CVE-2022-34713
Indicators of Compromise
- Unexpected .diagcab files appearing in email attachments or download folders
- Suspicious executables appearing in the Windows Startup folder (%AppData%\Microsoft\Windows\Start Menu\Programs\Startup)
- msdt.exe process spawning unexpected child processes
- Registry modifications related to MSDT diagnostic package handling
Detection Strategies
- Monitor for execution of msdt.exe with unusual command-line parameters or from unexpected parent processes
- Implement file integrity monitoring on the Windows Startup folder to detect unauthorized file additions
- Deploy endpoint detection rules to identify .diagcab file downloads from untrusted sources
- Analyze email gateway logs for .diagcab attachments in inbound messages
Monitoring Recommendations
- Enable Windows Event logging for process creation (Event ID 4688) with command-line auditing to track MSDT execution
- Configure SIEM rules to alert on file writes to Startup folders following MSDT process execution
- Implement network monitoring to detect downloads of .diagcab files from external sources
- Review endpoint telemetry for unusual persistence mechanisms being established
How to Mitigate CVE-2022-34713
Immediate Actions Required
- Apply the Microsoft security update for CVE-2022-34713 immediately across all affected Windows systems
- Review the CISA Known Exploited Vulnerability entry for compliance deadlines
- Audit systems for signs of compromise, particularly checking Startup folders for unexpected executables
- Block or quarantine .diagcab file attachments at email gateways pending patch deployment
Patch Information
Microsoft released security updates addressing CVE-2022-34713 as part of their August 2022 Patch Tuesday release. Administrators should consult the Microsoft Security Advisory for CVE-2022-34713 for specific KB article numbers and download links for each affected product version. Given the active exploitation status, prioritize patching all affected systems immediately.
Workarounds
- Disable the MSDT URL protocol by deleting the HKEY_CLASSES_ROOT\ms-msdt registry key as a temporary mitigation
- Block .diagcab files at email gateways and web proxies until patches are applied
- Implement application control policies to prevent execution of untrusted executables from Startup folders
- Educate users about the risks of opening unsolicited diagnostic package files
# Disable MSDT URL Protocol (Run as Administrator)
# Backup the registry key first
reg export HKEY_CLASSES_ROOT\ms-msdt ms-msdt-backup.reg
# Delete the MSDT URL protocol handler
reg delete HKEY_CLASSES_ROOT\ms-msdt /f
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


