CVE-2023-47040

7.8 HIGH

📋 TL;DR

Adobe Media Encoder versions 24.0.2 and earlier, and 23.6 and earlier, contain an out-of-bounds read vulnerability when parsing malicious files. An attacker could exploit this to execute arbitrary code with the privileges of the current user. Exploitation requires user interaction, such as opening a crafted file.

💻 Affected Systems

Products:
  • Adobe Media Encoder
Versions: 24.0.2 and earlier, 23.6 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable when processing files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary code execution with user privileges, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Application crash (denial of service) or limited information disclosure from memory reads; code execution is possible but requires successful exploitation.

🟢

If Mitigated

No impact if the application is not used to open untrusted files or if patched.

🌐 Internet-Facing: LOW, as exploitation requires user interaction with a malicious file, not network exposure.
🏢 Internal Only: MEDIUM, due to the need for user interaction but potential for phishing or shared malicious files internally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious file) and bypassing memory protections; no public exploits are known as of the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.0.3 and later, 23.6.1 and later

Vendor Advisory: https://helpx.adobe.com/security/products/media-encoder/apsb23-63.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to the 'Apps' section. 3. Find Adobe Media Encoder and click 'Update' to the latest version. 4. Restart the application after update.

🔧 Temporary Workarounds

Restrict file processing

all

Avoid opening untrusted or unknown files with Adobe Media Encoder.

Use application controls

windows

Implement software restriction policies or application allowlisting to block execution of untrusted files.

🧯 If You Can't Patch

  • Disable or uninstall Adobe Media Encoder if not needed.
  • Use sandboxing or virtualization to isolate the application when processing files.

🔍 How to Verify

Check if Vulnerable:

Check the version in Adobe Media Encoder: Help > About Adobe Media Encoder. If version is 24.0.2 or earlier, or 23.6 or earlier, it is vulnerable.

Check Version:

On Windows: Check via Adobe Creative Cloud or in-app Help > About. On macOS: Use 'Get Info' on the application or in-app Help > About.

Verify Fix Applied:

Verify the version is 24.0.3 or later, or 23.6.1 or later after updating.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or unexpected terminations in Adobe Media Encoder logs.
  • File access events for suspicious or unknown media files.

Network Indicators:

  • Unusual outbound connections from Adobe Media Encoder process post-file opening.

SIEM Query:

Example for Splunk: source="*adobe*" (event_type="crash" OR "Media Encoder") | stats count by host, user

🔗 References

📤 Share & Export