Cybersecurity Forum

This forum is for all security enthusiasts to discuss Fortinet's latest & evolving technologies and to connect & network with peers in the cybersecurity hemisphere. Share and learn on a broad range of topics like best practices, use cases, integrations and more. For support specific questions/resources, please visit the Support Forum or the Knowledge Base.

IvanSipos
New Contributor II

WMI Problem CVE-2022-30190

Dear

we have detected that wmi stops working because of the update.
Microsoft patches Follina vulnerability (CVE-2022-30190) in Windows with June 2022 updates .
WMI queries are rejected
The issue affects Windows Server 2012 and Windows Server 2019 for me.
Has the same thing happened to you?
Do you know any kb to solve it, as we can't receive log from windows servers?

Regards
2 REPLIES 2
FSM_FTNT
Staff
Staff

Hi Ivan

Windows OMI integration should continue to work.

We introduced OMI support in FortiSIEM from version 6.3.3 https://docs.fortinet.com/document/fortisiem/6.3.3/release-notes/749147/whats-new-in-6-3-3 and details can be found here https://docs.fortinet.com/document/fortisiem/6.5.0/external-systems-configuration-guide/421011/micro... 

Thanks

------------------------------
Daniel
FortiSIEM Product Manager
------------------------------
IvanSipos
New Contributor II

Hi Daniel

In order to resolve this issue, you can disable the registry key RequireIntegrityActivationAuthenticationLevel on the Windows server hosting the Domain Controller(s). If this is not an option for you, consider one of the remaining options listed below.

Path : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole\AppCompat
Value Name: "RequireIntegrityActivationAuthenticationLevel"
Type: dword
Value Data: 0x00000000 means disabled.
Note: You must enter Value Data in hexadecimal format. You must restart your device after setting this registry key for it to take effect.


Regards