CVE-2022-23203

7.8 HIGH

📋 TL;DR

This buffer overflow vulnerability in Adobe Photoshop allows attackers to execute arbitrary code by tricking users into opening specially crafted malicious files. Affected users include anyone running vulnerable versions of Photoshop on Windows or macOS. Successful exploitation gives attackers the same privileges as the current user.

💻 Affected Systems

Products:
  • Adobe Photoshop
Versions: 22.5.4 and earlier, 23.1 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configurations required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer, enabling data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to data exfiltration, installation of persistent malware, or credential harvesting from the compromised user account.

🟢

If Mitigated

Limited impact due to user awareness training preventing malicious file openings, application sandboxing, or endpoint protection blocking the exploit.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code has been disclosed as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Photoshop 22.5.5 and 23.2

Vendor Advisory: https://helpx.adobe.com/security/products/photoshop/apsb22-08.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application
2. Navigate to 'Apps' section
3. Find Photoshop in your installed apps
4. Click 'Update' button
5. Wait for download and installation to complete
6. Restart Photoshop when prompted

🔧 Temporary Workarounds

Disable Photoshop file associations

all

Prevent Photoshop from automatically opening potentially malicious files by changing default file associations

Windows: Control Panel > Default Programs > Set Associations
macOS: Finder > Get Info > Open With > Change All

🧯 If You Can't Patch

  • Implement application whitelisting to block execution of unauthorized Photoshop files
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious Photoshop process behavior

🔍 How to Verify

Check if Vulnerable:

Check Photoshop version via Help > About Photoshop in the application menu

Check Version:

Photoshop: Help > About Photoshop (GUI only, no CLI command)

Verify Fix Applied:

Verify Photoshop version is 22.5.5 or higher (for version 22) or 23.2 or higher (for version 23)

📡 Detection & Monitoring

Log Indicators:

  • Unusual Photoshop process spawning child processes
  • Photoshop crashes with memory access violations
  • Multiple failed file open attempts in Photoshop logs

Network Indicators:

  • Outbound connections from Photoshop process to unknown external IPs
  • DNS queries for suspicious domains following Photoshop execution

SIEM Query:

process_name:"photoshop.exe" AND (child_process_count:>3 OR memory_usage:>threshold)

🔗 References

📤 Share & Export