CVE-2024-47443
📋 TL;DR
CVE-2024-47443 is an out-of-bounds write vulnerability in Adobe After Effects that could allow arbitrary code execution when a user opens a malicious file. This affects users running vulnerable versions of After Effects, potentially leading to full system compromise within the user's context.
💻 Affected Systems
- Adobe After Effects
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining the same privileges as the logged-in user, enabling data theft, ransomware deployment, or persistent backdoor installation.
Likely Case
Malicious actors craft specially designed After Effects project files that, when opened, execute code to steal credentials, install malware, or encrypt files for ransom.
If Mitigated
With proper controls, impact is limited to the user's application sandbox without system-wide compromise, though user data within After Effects could still be accessed.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious file). No public exploit code is currently available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: After Effects 24.6.3 and later
Vendor Advisory: https://helpx.adobe.com/security/products/after_effects/apsb24-85.html
Restart Required: Yes
Instructions:
1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find After Effects and click 'Update'. 4. Restart After Effects after update completes.
🔧 Temporary Workarounds
Restrict file opening
allConfigure system policies to prevent opening untrusted After Effects project files (.aep, .aet)
🧯 If You Can't Patch
- Implement application whitelisting to block execution of malicious payloads
- Use network segmentation to isolate After Effects workstations from critical systems
🔍 How to Verify
Check if Vulnerable:
Check After Effects version via Help > About After Effects. If version is 23.6.9 or earlier, or 24.6.2 or earlier, system is vulnerable.
Check Version:
On Windows: wmic product where name="Adobe After Effects" get version
On macOS: /Applications/Adobe\ After\ Effects\ */Adobe\ After\ Effects.app/Contents/Info.plist | grep -A1 CFBundleShortVersionString
Verify Fix Applied:
Verify After Effects version is 24.6.3 or later via Help > About After Effects.
📡 Detection & Monitoring
Log Indicators:
- Unexpected After Effects crashes with memory access violations
- Suspicious child processes spawned from After Effects
Network Indicators:
- Outbound connections from After Effects to unknown IPs
- DNS requests for suspicious domains after file opening
SIEM Query:
process_name:"AfterFX.exe" AND (event_id:1000 OR parent_process_name:"AfterFX.exe")