CVE-2023-25889

7.8 HIGH

📋 TL;DR

Adobe Dimension versions 3.4.7 and earlier contain an out-of-bounds read vulnerability when parsing malicious files. This could allow an attacker to execute arbitrary code with the privileges of the current user. Users who open untrusted Adobe Dimension files are affected.

💻 Affected Systems

Products:
  • Adobe Dimension
Versions: 3.4.7 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable when opening files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary code execution with user privileges, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Application crash or limited information disclosure from memory reads, with potential for code execution if combined with other vulnerabilities.

🟢

If Mitigated

No impact if users don't open untrusted files or if application is patched.

🌐 Internet-Facing: LOW - Requires user interaction to open malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be tricked into opening malicious files via phishing or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (opening malicious file) and may require additional techniques for reliable code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.8 or later

Vendor Advisory: https://helpx.adobe.com/security/products/dimension/apsb23-20.html

Restart Required: Yes

Instructions:

1. Open Adobe Dimension. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 3.4.8 or later. 4. Restart Adobe Dimension.

🔧 Temporary Workarounds

Restrict file opening

all

Configure Adobe Dimension to only open trusted files from known sources.

Application control

all

Use application whitelisting to prevent execution of Adobe Dimension if not required.

🧯 If You Can't Patch

  • Implement strict file handling policies: only open Adobe Dimension files from trusted sources
  • Use sandboxing or virtualization for Adobe Dimension when processing untrusted files

🔍 How to Verify

Check if Vulnerable:

Check Adobe Dimension version in Help > About Adobe Dimension. If version is 3.4.7 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where name="Adobe Dimension" get version
On macOS: /Applications/Adobe\ Dimension.app/Contents/Info.plist | grep -A1 CFBundleShortVersionString

Verify Fix Applied:

Verify Adobe Dimension version is 3.4.8 or later in Help > About Adobe Dimension.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of Adobe Dimension
  • Unexpected file opening events in Adobe Dimension

Network Indicators:

  • Downloads of Adobe Dimension files from untrusted sources

SIEM Query:

source="*adobe*" AND (event="crash" OR event="file_open") AND process="Adobe Dimension"

🔗 References

📤 Share & Export