CVE-2024-34135

5.5 MEDIUM

📋 TL;DR

Adobe Illustrator versions 28.5, 27.9.4 and earlier contain an out-of-bounds read vulnerability that could allow attackers to read sensitive memory contents when users open malicious files. This could potentially bypass security mitigations like ASLR. Users of affected Illustrator versions who open untrusted files are at risk.

💻 Affected Systems

Products:
  • Adobe Illustrator
Versions: 28.5 and earlier, 27.9.4 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable when opening files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could read sensitive memory contents, potentially extracting credentials, encryption keys, or other confidential data, and bypass ASLR to enable further exploitation.

🟠

Likely Case

Limited information disclosure from memory, potentially revealing some system information but unlikely to lead to full system compromise without additional vulnerabilities.

🟢

If Mitigated

With proper controls, the impact is limited to potential memory information leakage without code execution.

🌐 Internet-Facing: LOW - Exploitation requires user interaction to open malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, requiring user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and knowledge of memory layout. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Illustrator 28.6 or later

Vendor Advisory: https://helpx.adobe.com/security/products/illustrator/apsb24-45.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' tab. 3. Find Adobe Illustrator. 4. Click 'Update' button. 5. Restart Illustrator after update completes.

🔧 Temporary Workarounds

Restrict file opening

all

Only open Illustrator files from trusted sources and avoid opening files from unknown or untrusted sources.

Use application sandboxing

all

Run Illustrator in a sandboxed environment to limit potential impact of memory reads.

🧯 If You Can't Patch

  • Implement strict file handling policies to prevent opening untrusted Illustrator files
  • Use endpoint detection and response (EDR) tools to monitor for suspicious file opening behavior

🔍 How to Verify

Check if Vulnerable:

Check Illustrator version via Help > About Illustrator. If version is 28.5 or earlier, or 27.9.4 or earlier, system is vulnerable.

Check Version:

On Windows: Check Illustrator version in Help > About Illustrator. On macOS: Illustrator > About Illustrator.

Verify Fix Applied:

Verify Illustrator version is 28.6 or later after updating.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Illustrator crash logs with memory access errors
  • Multiple failed file opening attempts from same user

Network Indicators:

  • Unusual file downloads followed by Illustrator launches

SIEM Query:

source="illustrator" AND (event_type="crash" OR event_type="file_open") AND file_extension IN ("ai", "eps", "pdf")

🔗 References

📤 Share & Export