CVE-2019-7968

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary commands on systems running vulnerable versions of Adobe Photoshop CC. Successful exploitation could lead to full system compromise. Affected users include anyone using Photoshop CC versions 19.1.8 and earlier or 20.0.5 and earlier.

💻 Affected Systems

Products:
  • Adobe Photoshop CC
Versions: 19.1.8 and earlier, 20.0.5 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data theft, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to user account compromise, data exfiltration, and persistence establishment.

🟢

If Mitigated

Limited impact with proper network segmentation, application sandboxing, and least privilege principles in place.

🌐 Internet-Facing: LOW (Photoshop is typically not exposed directly to the internet)
🏢 Internal Only: HIGH (Attackers with internal access could exploit this for lateral movement and privilege escalation)

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access or ability to trick user into opening malicious files. Command injection vulnerabilities are typically easy to weaponize once details are public.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Photoshop CC 19.1.9 and 20.0.6

Vendor Advisory: https://helpx.adobe.com/security/products/photoshop/apsb19-44.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' tab. 3. Find Photoshop CC and click 'Update'. 4. Restart Photoshop after update completes.

🔧 Temporary Workarounds

Restrict Photoshop file execution

all

Prevent execution of Photoshop files from untrusted sources using application control policies

Run Photoshop with reduced privileges

windows

Configure Photoshop to run with limited user privileges instead of administrative rights

🧯 If You Can't Patch

  • Isolate Photoshop workstations from critical network segments
  • Implement strict file validation and scanning for all Photoshop files before opening

🔍 How to Verify

Check if Vulnerable:

Check Photoshop version via Help > About Photoshop. If version is 19.1.8 or earlier, or 20.0.5 or earlier, system is vulnerable.

Check Version:

On Windows: Check registry at HKEY_LOCAL_MACHINE\SOFTWARE\Adobe\Photoshop\XX.0\Version (where XX is major version). On macOS: Check /Applications/Adobe Photoshop CC 20XX/Adobe Photoshop CC 20XX.app/Contents/Info.plist

Verify Fix Applied:

Verify Photoshop version is 19.1.9 or later for 19.x branch, or 20.0.6 or later for 20.x branch.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process spawning from Photoshop.exe
  • Command execution patterns in process creation logs
  • Photoshop crash logs with suspicious parameters

Network Indicators:

  • Photoshop process making unexpected network connections
  • Outbound connections from Photoshop to unusual destinations

SIEM Query:

Process Creation where (Image contains 'photoshop.exe' OR ParentImage contains 'photoshop.exe') AND CommandLine contains suspicious patterns like 'cmd', 'powershell', 'wscript'

🔗 References

📤 Share & Export