CVE-2022-28274

7.8 HIGH

📋 TL;DR

Adobe Photoshop versions 22.5.6 and earlier and 23.2.2 and earlier contain an out-of-bounds read vulnerability when parsing malicious files. An attacker could exploit this to execute arbitrary code in the context of the current user. This affects users who open untrusted Photoshop files.

💻 Affected Systems

Products:
  • Adobe Photoshop
Versions: 22.5.6 and earlier, 23.2.2 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. Requires user to open malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary code execution with current user privileges, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Application crash or limited information disclosure from memory reads, with potential for code execution if combined with other vulnerabilities.

🟢

If Mitigated

No impact if users don't open untrusted files or if application is patched.

🌐 Internet-Facing: LOW - Requires user interaction to open malicious file, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be tricked into opening malicious files via phishing or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and memory manipulation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Photoshop 22.5.7 and 23.3

Vendor Advisory: https://helpx.adobe.com/security/products/photoshop/apsb22-20.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to Apps tab. 3. Find Photoshop and click Update. 4. Restart Photoshop after update completes.

🔧 Temporary Workarounds

Restrict file opening

all

Configure Photoshop to only open files from trusted sources or disable automatic file opening.

Application control

windows

Use application whitelisting to restrict Photoshop execution to trusted locations only.

🧯 If You Can't Patch

  • Implement strict user training about opening untrusted Photoshop files
  • Use sandboxing or virtualization for Photoshop when handling untrusted files

🔍 How to Verify

Check if Vulnerable:

Check Photoshop version via Help > About Photoshop. If version is 22.5.6 or earlier, or 23.2.2 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where name="Adobe Photoshop" get version
On macOS: /Applications/Adobe\ Photoshop\ */Adobe\ Photoshop.app/Contents/Info.plist | grep -A1 CFBundleShortVersionString

Verify Fix Applied:

Verify Photoshop version is 22.5.7 or later for version 22.x, or 23.3 or later for version 23.x.

📡 Detection & Monitoring

Log Indicators:

  • Photoshop crash logs with memory access violations
  • Unexpected file opening events in application logs

Network Indicators:

  • Downloads of Photoshop files from untrusted sources

SIEM Query:

EventID=1000 AND Source="Photoshop" AND "Exception Code: 0xc0000005" OR ProcessName="Photoshop.exe" AND CommandLine contains suspicious file extensions

🔗 References

📤 Share & Export