CVE-2025-47119

5.5 MEDIUM

📋 TL;DR

Adobe Framemaker versions 2020.8, 2022.6 and earlier contain a NULL pointer dereference vulnerability that allows attackers to cause denial-of-service by crashing the application. Users who open malicious files are affected. This requires user interaction to exploit.

💻 Affected Systems

Products:
  • Adobe Framemaker
Versions: 2020.8 and earlier, 2022.6 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default when processing files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash leading to loss of unsaved work and service disruption for users processing documents.

🟠

Likely Case

Temporary denial-of-service where application crashes when opening a malicious file, requiring restart and potential data loss.

🟢

If Mitigated

Minimal impact if users only open trusted files from verified sources.

🌐 Internet-Facing: LOW - Exploitation requires user interaction with malicious files, not directly network exploitable.
🏢 Internal Only: MEDIUM - Internal users could be targeted with malicious documents via email or file shares.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user to open a malicious file. No authentication bypass needed beyond file access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Framemaker 2020.9 or 2022.7

Vendor Advisory: https://helpx.adobe.com/security/products/framemaker/apsb25-66.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' tab. 3. Find Adobe Framemaker. 4. Click 'Update' button. 5. Restart computer after installation completes.

🔧 Temporary Workarounds

Restrict file opening

all

Configure application to only open files from trusted sources using application restrictions or group policy.

Use application sandboxing

all

Run Framemaker in isolated environment or virtual machine to contain potential crashes.

🧯 If You Can't Patch

  • Implement strict file validation policies to only open documents from trusted sources
  • Use application whitelisting to prevent execution of modified Framemaker binaries

🔍 How to Verify

Check if Vulnerable:

Check Framemaker version via Help > About Adobe Framemaker. If version is 2020.8 or earlier, or 2022.6 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where "name like 'Adobe Framemaker%'" get version

Verify Fix Applied:

Verify version is 2020.9 or higher for 2020 branch, or 2022.7 or higher for 2022 branch.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs from Framemaker
  • Windows Event ID 1000 or 1001 for application crashes

Network Indicators:

  • Unusual file downloads preceding application crashes

SIEM Query:

source="*framemaker*" AND (event_id=1000 OR event_id=1001 OR "crash" OR "stopped working")

🔗 References

📤 Share & Export