CVE-2024-30285

5.5 MEDIUM

📋 TL;DR

Adobe Audition versions 24.2, 23.6.4 and earlier contain a NULL pointer dereference vulnerability that allows attackers to crash the application by tricking users into opening malicious files. This creates a denial-of-service condition where the application becomes unavailable. All users running affected versions are vulnerable.

💻 Affected Systems

Products:
  • Adobe Audition
Versions: 24.2, 23.6.4 and earlier versions
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash and data loss for unsaved work, requiring manual restart and potentially corrupting project files.

🟠

Likely Case

Application crash requiring user restart, causing temporary disruption to audio editing workflows.

🟢

If Mitigated

Minimal impact with proper user training and file validation controls in place.

🌐 Internet-Facing: LOW - Requires user interaction with malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted with malicious files via email or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening malicious file). No authentication bypass needed beyond file access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Audition 24.3 or later

Vendor Advisory: https://helpx.adobe.com/security/products/audition/apsb24-32.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find Adobe Audition and click 'Update'. 4. Wait for download and installation. 5. Restart Audition to apply update.

🔧 Temporary Workarounds

Restrict file sources

all

Only open Audition project files from trusted sources and avoid opening unknown files.

User awareness training

all

Train users to recognize suspicious files and avoid opening untrusted Audition project files.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized files
  • Use file integrity monitoring to detect unauthorized Audition project file modifications

🔍 How to Verify

Check if Vulnerable:

Check Audition version via Help > About Audition. If version is 24.2, 23.6.4 or earlier, system is vulnerable.

Check Version:

On Windows: Check via Help > About Audition. On macOS: Audition > About Audition

Verify Fix Applied:

Verify Audition version is 24.3 or later via Help > About Audition.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs with NULL pointer exceptions
  • Unexpected Audition process termination events

Network Indicators:

  • No network indicators - local file-based exploit

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName='Audition.exe' AND ExceptionCode=0xC0000005

🔗 References

📤 Share & Export