CVE-2024-47452

7.8 HIGH

📋 TL;DR

Adobe Illustrator versions 28.7.1 and earlier contain an out-of-bounds write vulnerability that could allow attackers to execute arbitrary code when a user opens a malicious file. This affects all users running vulnerable versions of Illustrator on any supported operating system. Successful exploitation requires user interaction through opening a crafted file.

💻 Affected Systems

Products:
  • Adobe Illustrator
Versions: 28.7.1 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Illustrator versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer in the context of the logged-in user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or malware installation when a user opens a malicious Illustrator file from an untrusted source.

🟢

If Mitigated

No impact if users only open trusted files from verified sources and have proper endpoint protection.

🌐 Internet-Facing: LOW - Exploitation requires local file access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Risk exists if users open malicious files from internal shares or email attachments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code available as of advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 28.7.2 or later

Vendor Advisory: https://helpx.adobe.com/security/products/illustrator/apsb24-87.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find Adobe Illustrator and click 'Update'. 4. Alternatively, download latest version from Adobe website. 5. Restart computer after installation.

🔧 Temporary Workarounds

Restrict untrusted file opening

all

Configure application control policies to block Illustrator from opening files from untrusted locations

Enable Protected View

all

Configure Illustrator to open files in Protected View mode for untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to block Illustrator execution entirely
  • Deploy endpoint detection and response (EDR) to monitor for suspicious Illustrator process behavior

🔍 How to Verify

Check if Vulnerable:

Open Adobe Illustrator, go to Help > About Illustrator. Check if version is 28.7.1 or earlier.

Check Version:

On Windows: Get-ItemProperty 'HKLM:\SOFTWARE\Adobe\Illustrator\28.0' | Select-Object -ExpandProperty Version. On macOS: /Applications/Adobe\ Illustrator\ 2024/Adobe\ Illustrator.app/Contents/Info.plist

Verify Fix Applied:

Verify Illustrator version is 28.7.2 or later in Help > About Illustrator.

📡 Detection & Monitoring

Log Indicators:

  • Illustrator crash logs with memory access violations
  • Unexpected child processes spawned from Illustrator.exe

Network Indicators:

  • Illustrator process making unexpected network connections after file open

SIEM Query:

process_name:"Illustrator.exe" AND (event_id:1000 OR event_id:1001) AND exception_code:0xc0000005

🔗 References

📤 Share & Export