CVE-2024-47421

7.8 HIGH

📋 TL;DR

Adobe Framemaker has an out-of-bounds read vulnerability when parsing malicious files, which could allow attackers to execute arbitrary code as the current user. This affects users of Adobe Framemaker versions 2020.6, 2022.4 and earlier who open untrusted files. Successful exploitation requires user interaction through opening a crafted malicious file.

💻 Affected Systems

Products:
  • Adobe Framemaker
Versions: 2020.6, 2022.4 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Limited code execution in user context leading to document/data theft, credential harvesting, or installation of additional malware.

🟢

If Mitigated

No impact if users don't open untrusted files and proper application controls are in place.

🌐 Internet-Facing: LOW - Exploitation requires user interaction with malicious files, not directly network exploitable.
🏢 Internal Only: MEDIUM - Risk exists if users open malicious files from internal sources like email attachments or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and crafting a file that triggers the out-of-bounds read to achieve code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Framemaker 2020.7 or 2022.5

Vendor Advisory: https://helpx.adobe.com/security/products/framemaker/apsb24-82.html

Restart Required: Yes

Instructions:

1. Open Adobe Framemaker. 2. Go to Help > Check for Updates. 3. Follow prompts to install available updates. 4. Restart Framemaker after installation completes.

🔧 Temporary Workarounds

Restrict file opening

all

Configure application control policies to prevent opening of untrusted .fm files

User awareness training

all

Train users to only open files from trusted sources

🧯 If You Can't Patch

  • Implement application control policies to block execution of vulnerable Framemaker versions
  • Use email/web gateways to block .fm file attachments and downloads

🔍 How to Verify

Check if Vulnerable:

Check Framemaker version via Help > About Adobe Framemaker. If version is 2020.6, 2022.4 or earlier, system is vulnerable.

Check Version:

On Windows: Check registry at HKEY_LOCAL_MACHINE\SOFTWARE\Adobe\Framemaker\Version. On macOS: Check /Applications/Adobe Framemaker/Contents/Info.plist

Verify Fix Applied:

Verify version is 2020.7 or 2022.5 or later via Help > About Adobe Framemaker.

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for Framemaker with suspicious parent processes
  • Application crash logs from Framemaker

Network Indicators:

  • Outbound connections from Framemaker process to unknown IPs

SIEM Query:

process_name:"framemaker.exe" AND (parent_process_name NOT IN ("explorer.exe", "cmd.exe") OR command_line CONTAINS ".fm")

🔗 References

📤 Share & Export