CVE-2024-34123

7.0 HIGH

📋 TL;DR

This CVE describes an untrusted search path vulnerability in Adobe Premiere Pro that could allow arbitrary code execution. Attackers could exploit this by placing malicious files in locations where Premiere Pro searches for executables or libraries. The vulnerability affects users of Premiere Pro versions 23.6.5, 24.4.1 and earlier who open projects from untrusted sources.

💻 Affected Systems

Products:
  • Adobe Premiere Pro
Versions: 23.6.5, 24.4.1 and earlier versions
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Exploitation requires user interaction such as opening a project file from an untrusted location.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Premiere Pro user, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or malware execution within the user context, potentially stealing project files, credentials, or installing spyware.

🟢

If Mitigated

No impact if proper patching and security controls are implemented, as the vulnerability requires specific conditions and user interaction.

🌐 Internet-Facing: LOW - This is primarily a client-side vulnerability requiring local file system access or user interaction with malicious files.
🏢 Internal Only: MEDIUM - Internal users could be targeted via shared network drives, email attachments, or compromised internal systems, but exploitation requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires user interaction and knowledge of the application's search path behavior. No public exploits have been reported as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Premiere Pro 24.4.2 or later

Vendor Advisory: https://helpx.adobe.com/security/products/premiere_pro/apsb24-46.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to the 'Apps' section. 3. Find Premiere Pro and click 'Update'. 4. Wait for download and installation to complete. 5. Restart Premiere Pro when prompted.

🔧 Temporary Workarounds

Restrict project file sources

all

Only open Premiere Pro project files from trusted sources and locations. Avoid opening projects from untrusted network shares, USB drives, or email attachments.

Run with reduced privileges

all

Run Premiere Pro with standard user privileges rather than administrative rights to limit potential damage from exploitation.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized binaries
  • Use endpoint detection and response (EDR) solutions to monitor for suspicious process creation from Premiere Pro

🔍 How to Verify

Check if Vulnerable:

Check Premiere Pro version via Help > About Premiere Pro. If version is 23.6.5, 24.4.1 or earlier, the system is vulnerable.

Check Version:

On Windows: Check via Creative Cloud app or Premiere Pro Help menu. On macOS: Premiere Pro > About Premiere Pro

Verify Fix Applied:

Verify version is 24.4.2 or later in Help > About Premiere Pro. No further action needed if updated.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process execution from Premiere Pro directory
  • Failed attempts to load DLLs or executables from unusual paths

Network Indicators:

  • Unusual outbound connections from Premiere Pro process

SIEM Query:

Process creation where parent process contains 'premiere' and child process is from unusual location or has suspicious characteristics

🔗 References

📤 Share & Export