PostHole
Compose Login
You are browsing eu.zone1 in read-only mode. Log in to participate.
rss-bridge 2025-11-11T18:44:52+00:00

Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution

Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.

Adobe InDesign is a professional page layout and desktop publishing software used for designing and publishing content for both print and digital media.Adobe InCopy is a professional word processor designed for writers and editors to collaborate with designers on documents simultaneously.Adobe Photoshop is a powerful raster graphics editor developed by Adobe for image creation, editing, and manipulation.Adobe Illustrator is a professional vector graphics editor used for creating logos, icons, typography, and other scalable graphics that retain clarity at any size.Adobe Illustrator mobile is a vector graphics app for the iPad that allows users to create and edit illustrations, logos, and graphics on the go.Adobe Pass is a cloud-based service that helps broadcasters, cable networks, and pay-TV providers manage subscriber access to online content, enabling viewers to log in once and watch across multiple devices and websites.Adobe Substance 3D is a suite of tools for creating 3D content, including modeling, texturing, and rendering.Adobe Format Plugins are software add-ons for Adobe products that extend functionality, allowing them to interact with and convert between various file formats.

Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.


Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution

MS-ISAC ADVISORY NUMBER:

2025-104

DATE(S) ISSUED:

11/11/2025

OVERVIEW:

Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.

  • Adobe InDesign is a professional page layout and desktop publishing software used for designing and publishing content for both print and digital media.
  • Adobe InCopy is a professional word processor designed for writers and editors to collaborate with designers on documents simultaneously.
  • Adobe Photoshop is a powerful raster graphics editor developed by Adobe for image creation, editing, and manipulation.
  • Adobe Illustrator is a professional vector graphics editor used for creating logos, icons, typography, and other scalable graphics that retain clarity at any size.
  • Adobe Illustrator mobile is a vector graphics app for the iPad that allows users to create and edit illustrations, logos, and graphics on the go.
  • Adobe Pass is a cloud-based service that helps broadcasters, cable networks, and pay-TV providers manage subscriber access to online content, enabling viewers to log in once and watch across multiple devices and websites.
  • Adobe Substance 3D is a suite of tools for creating 3D content, including modeling, texturing, and rendering.
  • Adobe Format Plugins are software add-ons for Adobe products that extend functionality, allowing them to interact with and convert between various file formats.

Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

THREAT INTELLIGENCE:

There are currently no reports of these vulnerabilities being exploited in the wild.

SYSTEMS AFFECTED:

  • Adobe InDesign ID20.5 and earlier versions
  • Adobe InDesign ID19.5.5 and earlier versions
  • Adobe InCopy 20.5 and earlier versions
  • Adobe InCopy 19.5.5 and earlier versions
  • Photoshop 2025 26.8.1 and earlier versions
  • Illustrator 2025 29.8.2 and earlier versions
  • Illustrator 2024 28.7.10 and earlier versions
  • Adobe Illustrator on iPad 3.0.9 and earlier versions
  • Adobe Pass Authentication Android SDK 3.7.3 and earlier versions
  • Adobe Substance 3D Stager 3.1.5 and earlier versions
  • Adobe Format Plugins 1.1.1 and earlier versions

RISK:

Government:

Large and medium government entitiesHIGH

Small governmentMEDIUM

Businesses:

Large and medium business entitiesHIGH

Small business entitiesMEDIUM

Home Users:

LOW

TECHNICAL SUMMARY:

Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Details of these vulnerabilities are as follows:

Tactic: Execution (TA0002)

Technique: Exploitation for Client Execution (T1203):

Adobe InDesign:

  • Use After Free (CVE-2025-61814, CVE-2025-61815)
  • Heap-based Buffer Overflow (CVE-2025-61824, CVE-2025-61832)

Adobe InCopy:

  • Heap-based Buffer Overflow (CVE-2025-61816)
  • Use After Free (CVE-2025-61817, CVE-2025-61818)

Adobe Photoshop:

  • Heap-based Buffer Overflow (CVE-2025-61819)

Adobe Illustrator:

  • Heap-based Buffer Overflow (CVE-2025-61820)
  • Out-of-bounds Write (CVE-2025-61831)

Adobe Illustrator on iPad:

  • Integer Underflow (Wrap or Wraparound) (CVE-2025-61826, CVE-2025-61836)
  • Heap-based Buffer Overflow (CVE-2025-61827, CVE-2025-61829)
  • Out-of-bounds Write (CVE-2025-61828)

Adobe Pass

  • Incorrect Authorization (CVE-2025-61830)

Substance 3D Stager:

  • Out-of-bounds Read (CVE-2025-61833)
  • Use After Free (CVE-2025-61834, CVE-2025-64531)
  • Integer Underflow (Wrap or Wraparound) (CVE-2025-61835)

Adobe Format Plugins:

  • Heap-based Buffer Overflow (CVE-2025-61837, CVE-2025-61838)
  • Out-of-bounds Read (CVE-2025-61839, CVE-2025-61840, CVE-2025-61841, CVE-2025-61843, CVE-2025-61844, CVE-2025-61845)
  • Use After Free (CVE-2025-61842)

Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

RECOMMENDATIONS:

We recommend the following actions be taken:

  • Apply the stable channel update provided by Adobe to vulnerable systems immediately after appropriate testing. (M1051: Update Software)
  • Safeguard 7.1: Establish and Maintain a Vulnerability Management Process: Establish and maintain a documented vulnerability management process for enterprise assets. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
  • Safeguard 7.2: Establish and Maintain a Remediation Process: Establish and maintain a risk-based remediation strategy documented in a remediation process, with monthly, or more frequent, reviews.
  • Safeguard 7.6: Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets: Perform automated vulnerability scans of externally-exposed enterprise assets using a SCAP-compliant vulnerability scanning tool. Perform scans on a monthly, or more frequent, basis.
  • Safeguard 7.7: Remediate Detected Vulnerabilities: Remediate detected vulnerabilities in software through processes and tooling on a monthly, or more frequent, basis, based on the remediation process.
  • Safeguard 16.13: Conduct Application Penetration Testing: Conduct application penetration testing. For critical applications, authenticated penetration testing is better suited to finding business logic vulnerabilities than code scanning and automated security testing. Penetration testing relies on the skill of the tester to manually manipulate an application as an authenticated and unauthenticated user.
  • Safeguard 18.1: Establish and Maintain a Penetration Testing Program: Establish and maintain a penetration testing program appropriate to the size, complexity, and maturity of the enterprise. Penetration testing program characteristics include scope, such as network, web application, Application Programming Interface (API), hosted services, and physical premise controls; frequency; limitations, such as acceptable hours, and excluded attack types; point of contact information; remediation, such as how findings will be routed internally; and retrospective requirements.
  • Safeguard 18.2: Perform Periodic External Penetration Tests: Perform periodic external penetration tests based on program requirements, no less than annually. External penetration testing must include enterprise and environmental reconnaissance to detect exploitable information. Penetration testing requires specialized skills and experience and must be conducted through a qualified party. The testing may be clear box or opaque box.
  • Safeguard 18.3: Remediate Penetration Test Findings: Remediate penetration test findings based on the enterprise’s policy for remediation scope and prioritization.

[...]


Original source

Reply