CVE-2025-30301

5.5 MEDIUM

📋 TL;DR

Adobe Framemaker versions 2020.8, 2022.6 and earlier contain a NULL pointer dereference vulnerability that allows attackers to cause denial-of-service by crashing the application. Users who open malicious files are affected. This requires user interaction to exploit.

💻 Affected Systems

Products:
  • Adobe Framemaker
Versions: 2020.8 and earlier, 2022.6 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. Requires user to open a malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Application crashes when processing a malicious file, causing loss of unsaved work and temporary unavailability of the software.

🟠

Likely Case

Targeted attacks against specific users to disrupt their work by sending crafted files that crash Framemaker.

🟢

If Mitigated

Minimal impact if users avoid opening untrusted files and patches are applied promptly.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening malicious file). No authentication required beyond file access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to versions after 2020.8 and 2022.6 as specified in Adobe advisory

Vendor Advisory: https://helpx.adobe.com/security/products/framemaker/apsb25-33.html

Restart Required: Yes

Instructions:

1. Open Adobe Framemaker. 2. Go to Help > Check for Updates. 3. Follow prompts to install latest version. 4. Restart application after update.

🔧 Temporary Workarounds

Restrict file opening

all

Configure system to prevent opening untrusted .fm files

Application sandboxing

all

Run Framemaker in restricted/sandboxed environment

🧯 If You Can't Patch

  • Implement application whitelisting to restrict which files Framemaker can open
  • Train users to never open untrusted .fm files from unknown sources

🔍 How to Verify

Check if Vulnerable:

Check Framemaker version in Help > About. If version is 2020.8 or earlier, or 2022.6 or earlier, system is vulnerable.

Check Version:

On Windows: Check Help > About in Framemaker GUI. No direct command-line version check available.

Verify Fix Applied:

Verify version is updated beyond affected versions (2020.8 for 2020 branch, 2022.6 for 2022 branch).

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs from Framemaker
  • Windows Event Logs showing application failures

Network Indicators:

  • Unusual file transfers of .fm files to targeted users

SIEM Query:

source="*framemaker*" AND (event_type="crash" OR severity="critical")

🔗 References

📤 Share & Export