A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word (From MicroSoft’s web, TL;DR).
This is a quick and dirty patch of MSDT: CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability (Follina). Assuming keeping your backup files in C:\tmp.
reg export HKEY_CLASSES_ROOT\ms-msdt C:\tmp\HKEY_CLASSES_ROOT-ms-msdt.bak.reg
reg delete HKEY_CLASSES_ROOT\ms-msdt /f