CVE-2019-7100

9.8 CRITICAL

📋 TL;DR

Adobe Shockwave Player versions 12.3.4.204 and earlier contain a memory corruption vulnerability that allows attackers to execute arbitrary code on affected systems. This affects users who have Shockwave Player installed and visit malicious websites or open malicious Shockwave content. The vulnerability is particularly dangerous because it can be exploited without user interaction beyond visiting a compromised webpage.

💻 Affected Systems

Products:
  • Adobe Shockwave Player
Versions: 12.3.4.204 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Shockwave Player is typically installed as a browser plugin for viewing Shockwave content.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the victim's computer, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to malware installation, credential theft, or system compromise when users visit malicious websites containing Shockwave content.

🟢

If Mitigated

Limited impact if systems are fully patched, have application whitelisting, or Shockwave Player is disabled/uninstalled.

🌐 Internet-Facing: HIGH - Shockwave Player is commonly used for web content, making internet-facing systems highly vulnerable to drive-by attacks.
🏢 Internal Only: MEDIUM - Internal systems could be compromised through phishing emails or internal web applications containing malicious Shockwave content.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability can be exploited through malicious Shockwave files (.swf) embedded in web pages. No authentication or user interaction beyond visiting a webpage is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.3.5.205

Vendor Advisory: https://helpx.adobe.com/security/products/shockwave/apsb19-20.html

Restart Required: Yes

Instructions:

1. Open Adobe Shockwave Player
2. Go to Help > Check for Updates
3. Follow prompts to install version 12.3.5.205 or later
4. Restart your browser and computer

🔧 Temporary Workarounds

Disable Shockwave Player in browsers

all

Prevent Shockwave content from executing in web browsers

For Chrome: chrome://settings/content/flash
For Firefox: about:addons > Plugins > Shockwave Flash > Never Activate
For Edge: edge://settings/content/flash

Uninstall Shockwave Player

all

Completely remove Shockwave Player from the system

Windows: Control Panel > Programs > Uninstall a program > Adobe Shockwave Player
macOS: Drag Adobe Shockwave Player from Applications folder to Trash

🧯 If You Can't Patch

  • Disable or uninstall Shockwave Player completely
  • Implement application whitelisting to block Shockwave Player execution
  • Use network filtering to block Shockwave content (.swf files) at the perimeter

🔍 How to Verify

Check if Vulnerable:

Check Shockwave Player version: Open Shockwave Player > Help > About Adobe Shockwave Player. If version is 12.3.4.204 or earlier, system is vulnerable.

Check Version:

Windows: reg query "HKLM\SOFTWARE\Adobe\Shockwave Player" /v Version | macOS: defaults read /Library/Internet\ Plug-Ins/Shockwave\ Player.plugin/Contents/Info.plist CFBundleVersion

Verify Fix Applied:

Verify version is 12.3.5.205 or later in About Adobe Shockwave Player dialog.

📡 Detection & Monitoring

Log Indicators:

  • Shockwave Player crash logs
  • Browser crash reports involving Shockwave content
  • Unexpected Shockwave Player process execution

Network Indicators:

  • HTTP requests for .swf files from suspicious domains
  • Unusual outbound connections following Shockwave content loading

SIEM Query:

source="*shockwave*" OR process="Shockwave*" AND (event_type="crash" OR event_type="execution")

🔗 References

📤 Share & Export