CVE-2023-48634

7.8 HIGH

📋 TL;DR

Adobe After Effects has an improper input validation vulnerability that allows arbitrary code execution when a user opens a malicious file. This affects users running vulnerable versions of Adobe After Effects on any operating system. The attacker needs to trick the user into opening a specially crafted file.

💻 Affected Systems

Products:
  • Adobe After Effects
Versions: 24.0.3 and earlier, 23.6.0 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to malware installation, credential theft, or data exfiltration from the affected system.

🟢

If Mitigated

No impact if users don't open untrusted files or if proper application whitelisting and file validation controls are in place.

🌐 Internet-Facing: LOW - Exploitation requires user interaction with malicious files, not direct network exposure.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, but still requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening malicious file) but the vulnerability itself has low complexity once the file is opened.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to After Effects 24.1 or 23.6.1

Vendor Advisory: https://helpx.adobe.com/security/products/after_effects/apsb23-75.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find Adobe After Effects. 4. Click 'Update' button. 5. Restart computer after installation completes.

🔧 Temporary Workarounds

Restrict file opening

all

Configure system to prevent opening of untrusted After Effects project files

Application control

all

Use application whitelisting to restrict execution of After Effects to trusted locations only

🧯 If You Can't Patch

  • Implement strict file validation policies to block opening of untrusted After Effects files
  • Use endpoint protection with behavior monitoring to detect and block suspicious file execution patterns

🔍 How to Verify

Check if Vulnerable:

Check After Effects version via Help > About After Effects menu

Check Version:

On Windows: Check program version in Control Panel > Programs. On macOS: Right-click After Effects app > Get Info

Verify Fix Applied:

Verify version is 24.1 or higher, or 23.6.1 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unexpected After Effects crashes
  • Suspicious file opening events in application logs
  • Unusual process spawning from After Effects

Network Indicators:

  • Outbound connections from After Effects to unknown IPs
  • DNS requests for suspicious domains after file opening

SIEM Query:

process_name:"AfterFX.exe" AND (event_type:"process_creation" OR event_type:"file_access") AND file_extension:".aep"

🔗 References

📤 Share & Export