CVE-2023-29308

7.8 HIGH

📋 TL;DR

This CVE describes an out-of-bounds write vulnerability in Adobe InDesign that could allow an attacker to execute arbitrary code on a victim's system. The vulnerability affects users running vulnerable versions of Adobe InDesign who open malicious files. Successful exploitation requires user interaction through opening a specially crafted file.

💻 Affected Systems

Products:
  • Adobe InDesign
Versions: ID18.3 and earlier, ID17.4.1 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. User interaction required (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or malware execution within the user's context, potentially compromising sensitive documents and enabling lateral movement within the network.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash rather than code execution.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user to open malicious file. No public exploit code available at time of advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ID18.4 and ID17.4.2

Vendor Advisory: https://helpx.adobe.com/security/products/indesign/apsb23-38.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find Adobe InDesign and click 'Update'. 4. Alternatively, download updated version from Adobe website. 5. Restart system after installation.

🔧 Temporary Workarounds

Restrict file opening

all

Configure application to only open trusted files or disable automatic opening of InDesign files

Application sandboxing

all

Run InDesign in restricted environment or virtual machine

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of malicious payloads
  • Use network segmentation to isolate InDesign workstations from critical systems

🔍 How to Verify

Check if Vulnerable:

Check InDesign version via Help > About InDesign. If version is ID18.3 or earlier OR ID17.4.1 or earlier, system is vulnerable.

Check Version:

On Windows: Check Add/Remove Programs. On macOS: Check Applications folder > Adobe InDesign > Get Info.

Verify Fix Applied:

Verify version is ID18.4 or later OR ID17.4.2 or later. Test with known safe InDesign files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected InDesign crashes
  • Suspicious file opening events
  • Unusual process spawning from InDesign

Network Indicators:

  • Outbound connections from InDesign to unknown IPs
  • DNS requests for suspicious domains after file opening

SIEM Query:

process_name:"InDesign.exe" AND (event_type:crash OR parent_process:unusual)

🔗 References

📤 Share & Export