CVE-2023-25895

7.8 HIGH

📋 TL;DR

Adobe Dimension versions 3.4.7 and earlier contain a heap-based buffer overflow vulnerability that allows arbitrary code execution when a user opens a malicious file. This affects all users running vulnerable versions of Adobe Dimension, requiring user interaction to trigger the exploit.

💻 Affected Systems

Products:
  • Adobe Dimension
Versions: 3.4.7 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Requires user to open a malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the user's system in the context of the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or malware installation on the affected system when a user opens a crafted malicious file.

🟢

If Mitigated

Limited impact with proper security controls like application sandboxing, least privilege user accounts, and file validation.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.8 or later

Vendor Advisory: https://helpx.adobe.com/security/products/dimension/apsb23-20.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find Adobe Dimension and click 'Update'. 4. Install version 3.4.8 or later. 5. Restart system after installation.

🔧 Temporary Workarounds

Disable automatic file opening

all

Configure system to not automatically open downloaded files and require explicit user action

Use application sandboxing

all

Run Adobe Dimension in a sandboxed environment to limit potential damage

🧯 If You Can't Patch

  • Restrict user permissions to least privilege accounts
  • Implement application whitelisting to prevent execution of unauthorized files

🔍 How to Verify

Check if Vulnerable:

Check Adobe Dimension version in application menu: Help > About Adobe Dimension

Check Version:

On Windows: wmic product where name="Adobe Dimension" get version
On macOS: /Applications/Adobe\ Dimension/Adobe\ Dimension.app/Contents/Info.plist | grep -A1 CFBundleShortVersionString

Verify Fix Applied:

Verify version is 3.4.8 or later in Help > About Adobe Dimension

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes of Adobe Dimension
  • Unusual file access patterns from Adobe Dimension process

Network Indicators:

  • Outbound connections from Adobe Dimension to unexpected destinations

SIEM Query:

process_name:"Adobe Dimension.exe" AND (event_type:crash OR file_path:*.dim OR file_path:*.lib)

🔗 References

📤 Share & Export