CVE-2025-49533

9.8 CRITICAL

📋 TL;DR

Adobe Experience Manager versions 6.5.23.0 and earlier contain a deserialization vulnerability that allows unauthenticated attackers to execute arbitrary code without user interaction. This affects all organizations running vulnerable AEM instances, potentially compromising entire systems. The vulnerability is rated CVSS 9.8 (Critical) due to its ease of exploitation and severe impact.

💻 Affected Systems

Products:
  • Adobe Experience Manager
Versions: 6.5.23.0 and earlier
Operating Systems: All platforms running AEM
Default Config Vulnerable: ⚠️ Yes
Notes: All AEM deployments with affected versions are vulnerable regardless of configuration. No special settings required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, lateral movement across networks, and persistent backdoor installation.

🟠

Likely Case

Attackers gain initial foothold on AEM servers, install cryptocurrency miners or data exfiltration tools, and potentially pivot to other internal systems.

🟢

If Mitigated

Attack attempts are detected and blocked by network segmentation, WAF rules, or runtime protection, limiting impact to isolated segments.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Deserialization vulnerabilities in enterprise software are frequently weaponized quickly. The advisory confirms exploitation doesn't require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.24.0 or later

Vendor Advisory: https://helpx.adobe.com/security/products/aem-forms/apsb25-67.html

Restart Required: Yes

Instructions:

1. Download AEM 6.5.24.0 or later from Adobe's distribution portal. 2. Backup current AEM instance and configuration. 3. Stop AEM service. 4. Apply the update following Adobe's upgrade documentation. 5. Restart AEM service. 6. Verify successful upgrade and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to AEM instances using firewalls to only allow necessary connections from trusted sources.

WAF Rule Implementation

all

Deploy Web Application Firewall rules to block suspicious deserialization patterns and payloads targeting AEM endpoints.

🧯 If You Can't Patch

  • Isolate AEM instances in separate network segments with strict firewall rules
  • Implement runtime application self-protection (RASP) or intrusion prevention systems

🔍 How to Verify

Check if Vulnerable:

Check AEM version via the AEM welcome page (/libs/granite/core/content/login.html) or by examining the CRX package manager. Versions 6.5.23.0 or earlier are vulnerable.

Check Version:

curl -s http://aem-host:port/libs/granite/core/content/login.html | grep 'AEM' or check /system/console/status-productinfo endpoint

Verify Fix Applied:

Verify AEM version is 6.5.24.0 or later. Test critical functionality remains operational post-upgrade.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Java deserialization errors in AEM logs
  • Suspicious class loading from unexpected sources
  • Unexpected process execution from AEM service account

Network Indicators:

  • HTTP requests with serialized Java objects to AEM endpoints
  • Outbound connections from AEM servers to unknown external IPs

SIEM Query:

source="aem.log" AND ("deserialization" OR "ClassNotFoundException" OR "InvalidClassException")

🔗 References

📤 Share & Export