CVE-2020-9635

8.8 HIGH

📋 TL;DR

Adobe Framemaker versions 2019.0.5 and below contain an out-of-bounds write vulnerability that could allow attackers to execute arbitrary code on affected systems. This affects users running vulnerable versions of Adobe Framemaker on any operating system. Successful exploitation requires the victim to open a specially crafted document.

💻 Affected Systems

Products:
  • Adobe Framemaker
Versions: 2019.0.5 and below
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. Exploitation requires user interaction to open a malicious document.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the victim's computer, enabling data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Arbitrary code execution with the privileges of the current user, potentially leading to malware installation, data exfiltration, or system disruption.

🟢

If Mitigated

Limited impact if proper application sandboxing, least privilege principles, and network segmentation are implemented, though document processing functionality would still be disrupted.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious document). No public exploit code was available at the time of the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2019.0.6

Vendor Advisory: https://helpx.adobe.com/security/products/framemaker/apsb20-32.html

Restart Required: Yes

Instructions:

1. Open Adobe Framemaker. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 2019.0.6 or later. 4. Restart the application after installation completes.

🔧 Temporary Workarounds

Document Source Restriction

all

Restrict opening of untrusted Framemaker documents by implementing application control policies or user training.

Application Sandboxing

all

Run Framemaker in a sandboxed environment or virtual machine to limit potential damage from exploitation.

🧯 If You Can't Patch

  • Discontinue use of Adobe Framemaker for processing untrusted documents until patching is possible.
  • Implement network segmentation to isolate systems running vulnerable Framemaker versions from critical network resources.

🔍 How to Verify

Check if Vulnerable:

Check Adobe Framemaker version via Help > About Adobe Framemaker. If version is 2019.0.5 or below, the system is vulnerable.

Check Version:

Not applicable - check via application GUI on Windows/macOS

Verify Fix Applied:

Verify version is 2019.0.6 or higher via Help > About Adobe Framemaker.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected application crashes of Framemaker.exe
  • Unusual process creation from Framemaker.exe
  • Suspicious document file access patterns

Network Indicators:

  • Unexpected outbound connections from Framemaker process
  • Document downloads from untrusted sources followed by Framemaker execution

SIEM Query:

process_name="Framemaker.exe" AND (event_id=1000 OR parent_process="Framemaker.exe")

🔗 References

📤 Share & Export