CVE-2019-8001

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code on systems running vulnerable versions of Adobe Photoshop CC. It affects users of Photoshop CC versions 19.1.8 and earlier, and 20.0.5 and earlier. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Adobe Photoshop CC
Versions: 19.1.8 and earlier, 20.0.5 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or remote code execution when a user opens a malicious Photoshop file, leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact if proper application whitelisting, network segmentation, and least privilege principles are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious file). No public exploit code was available at disclosure time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Photoshop CC 19.1.9 or 20.0.6

Vendor Advisory: https://helpx.adobe.com/security/products/photoshop/apsb19-44.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Click 'Update' next to Photoshop. 3. Follow on-screen instructions. 4. Restart Photoshop after update completes.

🔧 Temporary Workarounds

Restrict Photoshop file execution

all

Block execution of Photoshop files from untrusted sources using application control policies.

Network segmentation

all

Isolate Photoshop workstations from critical network segments.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized Photoshop file execution
  • Use network segmentation to isolate Photoshop systems from critical assets

🔍 How to Verify

Check if Vulnerable:

Check Photoshop version via Help > About Photoshop in the application menu.

Check Version:

On Windows: Check registry at HKEY_LOCAL_MACHINE\SOFTWARE\Adobe\Photoshop\[Version]\PluginVersion. On macOS: Check /Applications/Adobe Photoshop CC [Year]/Adobe Photoshop CC [Year].app/Contents/Info.plist

Verify Fix Applied:

Verify version is 19.1.9 or higher for 19.x branch, or 20.0.6 or higher for 20.x branch.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Photoshop crashes
  • Suspicious child processes spawned from Photoshop
  • Unusual file access patterns from Photoshop

Network Indicators:

  • Outbound connections from Photoshop to unusual destinations
  • DNS queries for known malicious domains from Photoshop systems

SIEM Query:

process_name:"photoshop.exe" AND (event_id:1 OR event_id:4688) AND parent_process_name NOT IN ("explorer.exe", "creativecloud.exe")

🔗 References

📤 Share & Export