CVE-2022-34243

7.8 HIGH

📋 TL;DR

This CVE describes a Use After Free vulnerability in Adobe Photoshop that could allow an attacker to execute arbitrary code on a victim's system. The vulnerability affects users of Photoshop versions 22.5.7 and earlier, and 23.3.2 and earlier. Exploitation requires the victim to open a malicious file, such as a specially crafted PSD document.

💻 Affected Systems

Products:
  • Adobe Photoshop
Versions: 22.5.7 and earlier, 23.3.2 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Photoshop versions are vulnerable. No special configurations or plugins are required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer in the context of the current user, potentially leading to data theft, ransomware deployment, or lateral movement within a network.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the affected system.

🟢

If Mitigated

Limited impact due to user account restrictions, with potential data loss or corruption but no system-wide compromise.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious file). The vulnerability is in the memory management of Photoshop's file parsing functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Photoshop 22.5.8 and 23.4

Vendor Advisory: https://helpx.adobe.com/security/products/photoshop/apsb22-35.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to the 'Apps' section. 3. Find Photoshop in your installed applications. 4. Click 'Update' if available. 5. Alternatively, download the latest version from Adobe's website. 6. Install the update and restart your computer.

🔧 Temporary Workarounds

Restrict Photoshop file types

all

Configure system or email security to block or quarantine PSD, PSB, and other Photoshop file formats from untrusted sources.

User awareness training

all

Educate users to only open Photoshop files from trusted sources and to be cautious of unexpected attachments.

🧯 If You Can't Patch

  • Run Photoshop with reduced privileges using application sandboxing or limited user accounts.
  • Implement application whitelisting to prevent execution of unauthorized code that might result from exploitation.

🔍 How to Verify

Check if Vulnerable:

Check Photoshop version via Help > About Photoshop in the application menu. If version is 22.5.7 or earlier, or 23.3.2 or earlier, the system is vulnerable.

Check Version:

On Windows: Check via Control Panel > Programs > Programs and Features. On macOS: Click Photoshop in Applications folder > Get Info.

Verify Fix Applied:

Verify Photoshop version is 22.5.8 or higher for version 22.x, or 23.4 or higher for version 23.x.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Photoshop crashes with memory access violations
  • Photoshop opening files from unusual locations or network shares
  • Process creation events from Photoshop with suspicious command lines

Network Indicators:

  • Unusual outbound connections from Photoshop process
  • File downloads to Photoshop process from untrusted sources

SIEM Query:

EventID=1 AND (Image='*photoshop.exe' OR ParentImage='*photoshop.exe') AND CommandLine LIKE '%powershell%' OR CommandLine LIKE '%cmd%'

🔗 References

📤 Share & Export