CVE-2024-41867

5.5 MEDIUM

📋 TL;DR

CVE-2024-41867 is an out-of-bounds read vulnerability in Adobe After Effects that could allow an attacker to read sensitive memory contents. This could potentially bypass security mitigations like ASLR. Users of affected After Effects versions who open malicious project files are at risk.

💻 Affected Systems

Products:
  • Adobe After Effects
Versions: 23.6.6, 24.5 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default when opening project files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Memory disclosure leading to ASLR bypass enabling more sophisticated attacks, potentially allowing arbitrary code execution in combination with other vulnerabilities.

🟠

Likely Case

Information disclosure of memory contents, potentially revealing sensitive data or system information that could aid further attacks.

🟢

If Mitigated

Limited impact if user doesn't open untrusted files, with memory disclosure contained to the application's process space.

🌐 Internet-Facing: LOW - Exploitation requires user interaction to open malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted with malicious project files via email or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user to open malicious project file. Memory disclosure could be used to bypass ASLR for more reliable exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: After Effects 24.6 and later

Vendor Advisory: https://helpx.adobe.com/security/products/after_effects/apsb24-55.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find After Effects and click 'Update'. 4. Restart After Effects after update completes.

🔧 Temporary Workarounds

Restrict file opening

all

Only open project files from trusted sources and avoid opening unexpected files.

Application sandboxing

all

Run After Effects in restricted/sandboxed environment to limit impact of memory disclosure.

🧯 If You Can't Patch

  • Implement strict file handling policies to prevent opening untrusted project files
  • Use application control solutions to restrict After Effects execution to trusted directories only

🔍 How to Verify

Check if Vulnerable:

Check After Effects version via Help > About After Effects. If version is 23.6.6, 24.5 or earlier, system is vulnerable.

Check Version:

On Windows: Check version in About dialog or registry. On macOS: Check application version in About dialog.

Verify Fix Applied:

Verify After Effects version is 24.6 or later via Help > About After Effects.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected file opening events in After Effects

Network Indicators:

  • No direct network indicators - exploitation is file-based

SIEM Query:

Process creation events for afterfx.exe with suspicious parent processes or command line arguments containing untrusted file paths

🔗 References

📤 Share & Export