CVE-2024-54050

6.1 MEDIUM

📋 TL;DR

Adobe Connect versions 12.6, 11.4.7 and earlier contain an open redirect vulnerability (CWE-601) that allows attackers to redirect users to malicious websites. This requires user interaction such as clicking a specially crafted link. Organizations using affected Adobe Connect versions are at risk.

💻 Affected Systems

Products:
  • Adobe Connect
Versions: 12.6, 11.4.7 and earlier
Operating Systems: All platforms running Adobe Connect
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be redirected to phishing sites that steal credentials or deliver malware, potentially leading to account compromise or system infection.

🟠

Likely Case

Attackers use crafted links in phishing campaigns to redirect users to fake login pages or malicious sites, potentially harvesting credentials.

🟢

If Mitigated

With proper user awareness training and web filtering, the impact is limited as users would recognize suspicious redirects.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically simple once a malicious link is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Adobe Connect 12.7 or 11.4.8

Vendor Advisory: https://helpx.adobe.com/security/products/connect/apsb24-99.html

Restart Required: Yes

Instructions:

1. Download the latest version from Adobe's website. 2. Backup your current installation. 3. Install the update following Adobe's documentation. 4. Restart the Adobe Connect service.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block redirects to external domains from Adobe Connect URLs.

User Awareness Training

all

Train users to recognize suspicious URLs and not click on unexpected redirect links.

🧯 If You Can't Patch

  • Implement strict outbound URL filtering to block redirects to untrusted domains.
  • Monitor for suspicious redirect patterns in web server logs and user reports.

🔍 How to Verify

Check if Vulnerable:

Check Adobe Connect version in administration console or via version file in installation directory.

Check Version:

Check the version.txt file in Adobe Connect installation directory or use the admin console.

Verify Fix Applied:

Verify version is 12.7 or 11.4.8 or later in administration console.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in web server logs
  • Multiple requests with external URL parameters

Network Indicators:

  • HTTP 302 redirects to external domains from Adobe Connect

SIEM Query:

source="adobe_connect" AND (url="*redirect=*" OR status=302) AND url!="*adobe.com*"

🔗 References

📤 Share & Export