CVE-2024-30285
📋 TL;DR
Adobe Audition versions 24.2, 23.6.4 and earlier contain a NULL pointer dereference vulnerability that allows attackers to crash the application by tricking users into opening malicious files. This creates a denial-of-service condition where the application becomes unavailable. All users running affected versions are vulnerable.
💻 Affected Systems
- Adobe Audition
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete application crash and data loss for unsaved work, requiring manual restart and potentially corrupting project files.
Likely Case
Application crash requiring user restart, causing temporary disruption to audio editing workflows.
If Mitigated
Minimal impact with proper user training and file validation controls in place.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious file). No authentication bypass needed beyond file access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to Audition 24.3 or later
Vendor Advisory: https://helpx.adobe.com/security/products/audition/apsb24-32.html
Restart Required: Yes
Instructions:
1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find Adobe Audition and click 'Update'. 4. Wait for download and installation. 5. Restart Audition to apply update.
🔧 Temporary Workarounds
Restrict file sources
allOnly open Audition project files from trusted sources and avoid opening unknown files.
User awareness training
allTrain users to recognize suspicious files and avoid opening untrusted Audition project files.
🧯 If You Can't Patch
- Implement application whitelisting to prevent execution of unauthorized files
- Use file integrity monitoring to detect unauthorized Audition project file modifications
🔍 How to Verify
Check if Vulnerable:
Check Audition version via Help > About Audition. If version is 24.2, 23.6.4 or earlier, system is vulnerable.
Check Version:
On Windows: Check via Help > About Audition. On macOS: Audition > About Audition
Verify Fix Applied:
Verify Audition version is 24.3 or later via Help > About Audition.
📡 Detection & Monitoring
Log Indicators:
- Application crash logs with NULL pointer exceptions
- Unexpected Audition process termination events
Network Indicators:
- No network indicators - local file-based exploit
SIEM Query:
EventID=1000 OR EventID=1001 AND ProcessName='Audition.exe' AND ExceptionCode=0xC0000005