CVE-2022-28835

7.8 HIGH

📋 TL;DR

Adobe InCopy versions 17.1 and earlier (and 16.4.1 and earlier) contain a use-after-free vulnerability that could allow attackers to execute arbitrary code on a victim's system. This requires user interaction where someone opens a malicious file. Users running affected versions are at risk of compromise.

💻 Affected Systems

Products:
  • Adobe InCopy
Versions: 17.1 and earlier, 16.4.1 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Requires user to open a malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Malicious document execution leading to malware installation, credential theft, or data exfiltration from the affected workstation.

🟢

If Mitigated

Limited impact due to application sandboxing or restricted user privileges, potentially containing the exploit to the application context.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code has been disclosed as of analysis date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 17.2 and 16.4.2

Vendor Advisory: https://helpx.adobe.com/security/products/incopy/apsb22-28.html

Restart Required: Yes

Instructions:

1. Open Adobe InCopy. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 17.2 or 16.4.2. 4. Restart the application.

🔧 Temporary Workarounds

Restrict file opening

all

Configure application to only open trusted files or disable automatic opening of certain file types.

Run with reduced privileges

windows

Run Adobe InCopy with limited user privileges to reduce impact if exploited.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized applications
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious file execution

🔍 How to Verify

Check if Vulnerable:

Check Adobe InCopy version via Help > About InCopy. If version is 17.1 or earlier, or 16.4.1 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where name="Adobe InCopy" get version

Verify Fix Applied:

Verify version is 17.2 or higher (for 17.x branch) or 16.4.2 or higher (for 16.x branch).

📡 Detection & Monitoring

Log Indicators:

  • Unexpected application crashes
  • Suspicious file opening events in application logs
  • Process creation from Adobe InCopy with unusual parameters

Network Indicators:

  • Outbound connections from Adobe InCopy to unknown IPs
  • DNS requests for suspicious domains after file opening

SIEM Query:

source="*adobe*" AND (event_type="process_creation" AND parent_process="incopy.exe") OR (event_type="file_access" AND process="incopy.exe" AND file_extension IN ("icml", "indd", "incx"))

🔗 References

📤 Share & Export