CVE-2024-49545

7.8 HIGH

📋 TL;DR

This CVE describes a heap-based buffer overflow vulnerability in Adobe InDesign that could allow an attacker to execute arbitrary code on the victim's system. The vulnerability affects users of InDesign Desktop versions ID19.5, ID18.5.4 and earlier. Exploitation requires the victim to open a maliciously crafted file.

💻 Affected Systems

Products:
  • Adobe InDesign Desktop
Versions: ID19.5, ID18.5.4 and earlier versions
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local code execution leading to malware installation, credential theft, or data exfiltration from the affected workstation.

🟢

If Mitigated

No impact if users don't open untrusted files and proper endpoint security controls are in place.

🌐 Internet-Facing: LOW - Exploitation requires local file access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Risk exists if users open malicious files from internal sources like email attachments or network shares.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and knowledge of heap manipulation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ID19.5.1 and ID18.5.5

Vendor Advisory: https://helpx.adobe.com/security/products/indesign/apsb24-97.html

Restart Required: Yes

Instructions:

1. Open Adobe InDesign. 2. Go to Help > Updates. 3. Follow prompts to install available updates. 4. Alternatively, download and install the latest version from Adobe Creative Cloud.

🔧 Temporary Workarounds

Restrict file opening

all

Configure application control policies to restrict opening of untrusted InDesign files

User awareness training

all

Train users to only open InDesign files from trusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to block execution of malicious code
  • Use endpoint detection and response (EDR) solutions to monitor for suspicious InDesign process behavior

🔍 How to Verify

Check if Vulnerable:

Check InDesign version via Help > About InDesign. If version is ID19.5 or earlier, or ID18.5.4 or earlier, system is vulnerable.

Check Version:

On Windows: Check via Control Panel > Programs > Programs and Features. On macOS: Check via Adobe InDesign > About InDesign.

Verify Fix Applied:

Verify version is ID19.5.1 or later, or ID18.5.5 or later after applying updates.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected InDesign crashes
  • Unusual file access patterns from InDesign process
  • Creation of suspicious child processes from InDesign

Network Indicators:

  • Outbound connections from InDesign process to unknown IPs
  • DNS queries for suspicious domains from InDesign

SIEM Query:

process_name:"InDesign.exe" AND (event_type:crash OR child_process_name:("cmd.exe", "powershell.exe", "wscript.exe"))

🔗 References

📤 Share & Export