CVE-2024-45136

7.8 HIGH

📋 TL;DR

CVE-2024-45136 is an unrestricted file upload vulnerability in Adobe InCopy that allows attackers to upload malicious files which could lead to arbitrary code execution on affected systems. This affects users of InCopy versions 19.4, 18.5.3 and earlier. Exploitation requires user interaction, such as tricking a user into opening a malicious document.

💻 Affected Systems

Products:
  • Adobe InCopy
Versions: 19.4 and earlier, 18.5.3 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Requires user interaction to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware installation on the user's workstation, potentially leading to credential theft or data exfiltration.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions preventing system-wide compromise.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (social engineering) to upload and execute malicious files. No public exploit code available as of advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to InCopy 19.5 or later, or 18.5.4 or later

Vendor Advisory: https://helpx.adobe.com/security/products/incopy/apsb24-79.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to the 'Apps' section. 3. Find Adobe InCopy and click 'Update'. 4. Alternatively, download the latest version from Adobe's website. 5. Install the update and restart your computer.

🔧 Temporary Workarounds

Restrict file uploads via application policies

all

Configure InCopy to only accept trusted file types and sources through application settings or group policies.

Implement application sandboxing

all

Run InCopy in a sandboxed environment to limit potential damage from malicious file execution.

🧯 If You Can't Patch

  • Restrict user privileges to prevent system-wide impact from successful exploitation
  • Implement network segmentation to limit lateral movement from compromised workstations

🔍 How to Verify

Check if Vulnerable:

Check InCopy version via Help > About InCopy. If version is 19.4 or earlier, or 18.5.3 or earlier, the system is vulnerable.

Check Version:

On Windows: Check Add/Remove Programs for Adobe InCopy version. On macOS: Check Applications folder or use 'mdls -name kMDItemVersion /Applications/Adobe\ InCopy*'

Verify Fix Applied:

After updating, verify version is 19.5 or later, or 18.5.4 or later in Help > About InCopy.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to InCopy directories
  • Execution of unexpected processes from InCopy context
  • Security software alerts for malicious file activity

Network Indicators:

  • Unexpected outbound connections from InCopy processes
  • File downloads to InCopy from untrusted sources

SIEM Query:

process_name:"incopy.exe" AND (file_creation:* OR network_connection:* ) | where file_extension NOT IN ("incx", "indd", "icml")

🔗 References

📤 Share & Export