CVE-2024-39381

7.8 HIGH

📋 TL;DR

CVE-2024-39381 is an out-of-bounds write vulnerability in Adobe After Effects that could allow arbitrary code execution when a user opens a malicious file. This affects users running After Effects versions 23.6.6, 24.5 and earlier. Successful exploitation requires user interaction but could lead to full system compromise.

💻 Affected Systems

Products:
  • Adobe After Effects
Versions: 23.6.6, 24.5 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. User interaction required (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to malware installation, credential theft, or lateral movement within the network.

🟢

If Mitigated

Limited impact with proper application sandboxing, user privilege restrictions, and file validation controls in place.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: MEDIUM with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: After Effects 24.6 and later

Vendor Advisory: https://helpx.adobe.com/security/products/after_effects/apsb24-55.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find After Effects and click 'Update'. 4. Follow on-screen prompts to complete installation. 5. Restart computer after update completes.

🔧 Temporary Workarounds

Restrict file opening

all

Implement application control policies to prevent opening untrusted After Effects files

User awareness training

all

Train users to only open After Effects files from trusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to restrict After Effects execution
  • Run After Effects in a sandboxed environment or virtual machine

🔍 How to Verify

Check if Vulnerable:

Check After Effects version via Help > About After Effects. If version is 23.6.6, 24.5 or earlier, system is vulnerable.

Check Version:

On Windows: Check via Creative Cloud app or Help > About. On macOS: Check via Creative Cloud app or After Effects > About After Effects.

Verify Fix Applied:

Verify After Effects version is 24.6 or later via Help > About After Effects.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected After Effects crashes
  • Suspicious file opening events in application logs
  • Unusual process spawning from After Effects

Network Indicators:

  • Outbound connections from After Effects to unknown IPs
  • DNS requests for suspicious domains after file opening

SIEM Query:

process_name:"AfterFX.exe" AND (event_type:"process_creation" OR event_type:"file_access") AND file_extension:".aep"

🔗 References

📤 Share & Export