CVE-2024-47423

7.8 HIGH

📋 TL;DR

Adobe Framemaker versions 2020.6, 2022.4 and earlier contain an unrestricted file upload vulnerability (CWE-434) that could allow arbitrary code execution. An attacker could exploit this by tricking a user into uploading a malicious file that gets automatically processed. This affects users of vulnerable Adobe Framemaker versions who interact with untrusted files.

💻 Affected Systems

Products:
  • Adobe Framemaker
Versions: 2020.6 and earlier, 2022.4 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining code execution at the user's privilege level, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or malware installation on the victim's workstation when a user opens a malicious file.

🟢

If Mitigated

Limited impact with proper application sandboxing and user awareness preventing malicious file execution.

🌐 Internet-Facing: LOW - Exploitation requires user interaction with a malicious file, not direct internet exposure.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious documents.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening a malicious file) but the technical complexity appears low based on the vulnerability type.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Framemaker 2020.7 or 2022.5

Vendor Advisory: https://helpx.adobe.com/security/products/framemaker/apsb24-82.html

Restart Required: Yes

Instructions:

1. Open Adobe Framemaker. 2. Go to Help > Check for Updates. 3. Follow prompts to install update. 4. Restart Framemaker after installation.

🔧 Temporary Workarounds

Restrict file uploads

all

Configure system policies to block execution of untrusted file types in Framemaker directories.

User awareness training

all

Train users to only open Framemaker files from trusted sources.

🧯 If You Can't Patch

  • Isolate vulnerable systems from network access where possible.
  • Implement application whitelisting to prevent execution of unauthorized files.

🔍 How to Verify

Check if Vulnerable:

Check Framemaker version via Help > About Adobe Framemaker. If version is 2020.6 or earlier, or 2022.4 or earlier, system is vulnerable.

Check Version:

On Windows: Check registry at HKEY_LOCAL_MACHINE\SOFTWARE\Adobe\FrameMaker\XX.0\Installation (where XX is version). On macOS: Check /Applications/Adobe FrameMaker XX/Contents/Info.plist

Verify Fix Applied:

Verify version is 2020.7 or higher for 2020 branch, or 2022.5 or higher for 2022 branch.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation in Framemaker temp directories
  • Process execution from Framemaker with suspicious parent processes

Network Indicators:

  • Outbound connections from Framemaker process to unknown IPs

SIEM Query:

process_name:"framemaker.exe" AND (file_create:* OR process_create:*)

🔗 References

📤 Share & Export