CVE-2024-47420

5.5 MEDIUM

📋 TL;DR

Adobe Animate versions 23.0.7, 24.0.4 and earlier contain an out-of-bounds read vulnerability that could allow attackers to read sensitive memory contents. This could potentially bypass security mitigations like ASLR. Users who open malicious files with vulnerable Animate versions are affected.

💻 Affected Systems

Products:
  • Adobe Animate
Versions: 23.0.7 and earlier, 24.0.4 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable when opening files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Memory disclosure leading to ASLR bypass enabling further exploitation, potentially resulting in arbitrary code execution or sensitive information leakage.

🟠

Likely Case

Limited information disclosure from memory, potentially revealing application data or system information without direct code execution.

🟢

If Mitigated

No impact if malicious files are not opened or if proper file validation is in place.

🌐 Internet-Facing: LOW - Requires user interaction to open malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted with malicious files via email or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (opening malicious file) and memory manipulation to achieve meaningful exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Animate 23.0.8 or 24.0.5

Vendor Advisory: https://helpx.adobe.com/security/products/animate/apsb24-76.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' tab. 3. Find Adobe Animate. 4. Click 'Update' if available. 5. Restart computer after update completes.

🔧 Temporary Workarounds

Restrict file opening

all

Only open Animate files from trusted sources and disable automatic file opening

Application control

all

Use application whitelisting to restrict Animate execution to specific users

🧯 If You Can't Patch

  • Implement strict file validation policies for Animate files
  • Use sandboxing or virtualization for Animate when opening untrusted files

🔍 How to Verify

Check if Vulnerable:

Check Animate version via Help > About Adobe Animate

Check Version:

On Windows: wmic product where name="Adobe Animate" get version

Verify Fix Applied:

Verify version is 23.0.8 or higher (for v23) or 24.0.5 or higher (for v24)

📡 Detection & Monitoring

Log Indicators:

  • Animate crash logs with memory access violations
  • Unexpected file opening events in Animate

Network Indicators:

  • Downloads of Animate files from untrusted sources

SIEM Query:

source="*animate*" AND (event="crash" OR event="file_open")

🔗 References

📤 Share & Export