CVE-2024-43759

5.5 MEDIUM

📋 TL;DR

Adobe Illustrator versions 28.6, 27.9.5 and earlier contain a NULL pointer dereference vulnerability that allows attackers to crash the application by tricking users into opening malicious files. This affects all users running vulnerable Illustrator versions, requiring user interaction through file opening to trigger the exploit.

💻 Affected Systems

Products:
  • Adobe Illustrator
Versions: 28.6 and earlier, 27.9.5 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. Requires user to open malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash leading to denial-of-service, potential data loss if unsaved work is open, and disruption of creative workflows.

🟠

Likely Case

Application crash when opening specifically crafted malicious files, requiring restart of Illustrator and potential loss of unsaved work.

🟢

If Mitigated

No impact if users avoid opening untrusted files or have patched versions installed.

🌐 Internet-Facing: LOW - Requires user interaction with malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted with malicious files via email or shared drives, but requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening malicious file). No authentication required beyond file access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Illustrator 28.7 or later, or 27.9.6 or later for version 27.x

Vendor Advisory: https://helpx.adobe.com/security/products/illustrator/apsb24-66.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' tab. 3. Find Adobe Illustrator. 4. Click 'Update' button. 5. Wait for download and installation. 6. Restart Illustrator.

🔧 Temporary Workarounds

Restrict file opening

all

Only open Illustrator files from trusted sources. Implement file type restrictions.

Application sandboxing

all

Run Illustrator in sandboxed environment to limit impact of crashes.

🧯 If You Can't Patch

  • Implement strict file opening policies - only open files from verified trusted sources
  • Use application whitelisting to prevent unauthorized Illustrator execution
  • Enable frequent auto-save features to minimize data loss from crashes
  • Educate users about risks of opening untrusted Illustrator files

🔍 How to Verify

Check if Vulnerable:

Check Illustrator version via Help > About Illustrator. If version is 28.6 or earlier, or 27.9.5 or earlier, system is vulnerable.

Check Version:

On Windows: Check via Illustrator Help > About. On macOS: Illustrator > About Illustrator

Verify Fix Applied:

Verify Illustrator version is 28.7 or later, or 27.9.6 or later for version 27.x after updating.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs from Illustrator
  • Unexpected termination events
  • Error logs mentioning NULL pointer or access violation

Network Indicators:

  • None - local file-based exploit

SIEM Query:

EventID=1000 OR EventID=1001 OR 'Illustrator' AND 'crash' OR 'terminated unexpectedly'

🔗 References

📤 Share & Export