CVE-2024-49551

7.8 HIGH

📋 TL;DR

Adobe Media Encoder versions 25.0, 24.6.3 and earlier contain an out-of-bounds write vulnerability that allows arbitrary code execution when a user opens a malicious file. This affects users of Adobe Media Encoder who process untrusted media files.

💻 Affected Systems

Products:
  • Adobe Media Encoder
Versions: 25.0, 24.6.3 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or malware execution when users open specially crafted malicious media files from untrusted sources.

🟢

If Mitigated

Limited impact with proper user training and file validation preventing malicious file execution.

🌐 Internet-Facing: LOW - Exploitation requires user interaction to open malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, but requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and knowledge of file format manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.1 and later

Vendor Advisory: https://helpx.adobe.com/security/products/media-encoder/apsb24-93.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find Media Encoder and click 'Update'. 4. Follow prompts to install version 25.1 or later. 5. Restart computer after installation.

🔧 Temporary Workarounds

Restrict file processing

all

Configure Media Encoder to only process files from trusted sources and locations.

User training and awareness

all

Train users to only open media files from trusted sources and verify file integrity.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized files
  • Use endpoint protection with file reputation checking and behavior monitoring

🔍 How to Verify

Check if Vulnerable:

Check Media Encoder version via Help > About Media Encoder. If version is 25.0, 24.6.3 or earlier, system is vulnerable.

Check Version:

On Windows: Check via Creative Cloud app or Help > About Media Encoder. On macOS: Check via Creative Cloud app or Media Encoder > About Media Encoder.

Verify Fix Applied:

Verify version is 25.1 or later in Help > About Media Encoder and check Adobe Security Bulletin APSB24-93 for confirmation.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes of Media Encoder
  • Suspicious file access patterns from Media Encoder process

Network Indicators:

  • Unusual outbound connections from Media Encoder process

SIEM Query:

Process:Media Encoder AND (EventID:1000 OR EventID:1001) OR FileAccess:*.mxf,*.mp4,*.mov FROM untrusted sources

🔗 References

📤 Share & Export