CVE-2024-47449

5.5 MEDIUM

📋 TL;DR

This CVE describes an out-of-bounds read vulnerability in Adobe Audition that could allow an attacker to read sensitive memory contents. When exploited, it could help bypass security mitigations like ASLR. Users of affected Audition versions who open malicious files are at risk.

💻 Affected Systems

Products:
  • Adobe Audition
Versions: 23.6.9 and earlier, 24.4.6 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable when opening files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Memory disclosure leading to ASLR bypass, potentially enabling further exploitation chains or information leakage about system memory layout.

🟠

Likely Case

Limited information disclosure from memory reads when opening specially crafted malicious files, potentially revealing some system information.

🟢

If Mitigated

No impact if users don't open untrusted files or have patched versions installed.

🌐 Internet-Facing: LOW - Requires user interaction to open malicious files, not directly network exploitable.
🏢 Internal Only: MEDIUM - Internal users could be targeted with malicious files via email or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and understanding of memory layout for effective ASLR bypass.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Audition 23.6.10 or 24.4.7

Vendor Advisory: https://helpx.adobe.com/security/products/audition/apsb24-83.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to Updates section. 3. Install available update for Audition. 4. Restart Audition after update completes.

🔧 Temporary Workarounds

Restrict file opening

all

Only open trusted files from verified sources in Audition

🧯 If You Can't Patch

  • Restrict Audition usage to opening only verified, trusted files from known sources
  • Implement application control policies to prevent execution of unauthorized Audition files

🔍 How to Verify

Check if Vulnerable:

Check Audition version via Help > About Audition. If version is 23.6.9 or earlier, or 24.4.6 or earlier, you are vulnerable.

Check Version:

On Windows: Check via Help > About Audition. On macOS: Audition > About Audition.

Verify Fix Applied:

Verify Audition version is 23.6.10 or higher (for v23) or 24.4.7 or higher (for v24) after updating.

📡 Detection & Monitoring

Log Indicators:

  • Audition crash logs with memory access violations
  • Unexpected file opening events in application logs

Network Indicators:

  • File downloads from untrusted sources followed by Audition execution

SIEM Query:

process_name:"Audition.exe" AND event_type:"process_start" AND parent_process_name:"explorer.exe" OR parent_process_name:"cmd.exe"

🔗 References

📤 Share & Export