CVE-2023-47070
📋 TL;DR
Adobe After Effects versions 24.0.2 and earlier, and 23.6 and earlier, contain an out-of-bounds write vulnerability that could allow attackers to execute arbitrary code with the privileges of the current user. This vulnerability requires user interaction, specifically opening a malicious file, making it a client-side attack vector primarily affecting individual users and workstations.
💻 Affected Systems
- Adobe After Effects
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the affected workstation, enabling data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Local privilege escalation leading to data exfiltration, malware installation, or persistence mechanisms on the compromised workstation.
If Mitigated
Limited impact with proper application sandboxing, user privilege restrictions, and security software preventing malicious file execution.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious file). No public exploit code available at time of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: After Effects 24.0.3 and 23.6.1
Vendor Advisory: https://helpx.adobe.com/security/products/after_effects/apsb23-66.html
Restart Required: Yes
Instructions:
1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find Adobe After Effects. 4. Click 'Update' button. 5. Restart computer after installation completes.
🔧 Temporary Workarounds
Restrict file opening
allImplement application control policies to prevent opening untrusted After Effects project files
User awareness training
allTrain users to only open After Effects files from trusted sources
🧯 If You Can't Patch
- Implement application whitelisting to block execution of malicious payloads
- Run After Effects with reduced user privileges or in sandboxed environments
🔍 How to Verify
Check if Vulnerable:
Check After Effects version via Help > About After Effects menu
Check Version:
Not applicable - check via application GUI
Verify Fix Applied:
Verify version is 24.0.3 or higher, or 23.6.1 or higher
📡 Detection & Monitoring
Log Indicators:
- Unexpected process creation from After Effects
- Memory access violations in application logs
- Unusual file access patterns
Network Indicators:
- Outbound connections from After Effects process to unknown IPs
- DNS queries for suspicious domains
SIEM Query:
process_name:"AfterFX.exe" AND (event_type:"process_creation" OR event_type:"file_access")