CVE-2025-61817

7.8 HIGH

📋 TL;DR

Adobe InCopy versions 20.5, 19.5.5 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code when a user opens a malicious file. This affects users of InCopy on any operating system where these vulnerable versions are installed. Successful exploitation requires user interaction through opening a specially crafted file.

💻 Affected Systems

Products:
  • Adobe InCopy
Versions: 20.5, 19.5.5 and earlier versions
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or malware execution within the user's context, potentially compromising sensitive documents and enabling lateral movement within the network.

🟢

If Mitigated

Limited impact with proper application sandboxing, restricted user privileges, and file execution policies preventing malicious file execution.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to InCopy 20.6 or later, or 19.5.6 or later

Vendor Advisory: https://helpx.adobe.com/security/products/incopy/apsb25-107.html

Restart Required: Yes

Instructions:

1. Open Adobe InCopy. 2. Go to Help > Check for Updates. 3. Follow prompts to install available updates. 4. Restart InCopy after installation completes.

🔧 Temporary Workarounds

Restrict file opening

all

Configure application control policies to prevent opening untrusted InCopy files

Run with reduced privileges

all

Configure InCopy to run with standard user privileges instead of administrative rights

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of malicious code
  • Use network segmentation to isolate InCopy systems from critical assets

🔍 How to Verify

Check if Vulnerable:

Check InCopy version via Help > About InCopy. If version is 20.5 or earlier, or 19.5.5 or earlier, system is vulnerable.

Check Version:

Not applicable - check via application GUI

Verify Fix Applied:

Verify version is 20.6 or later, or 19.5.6 or later via Help > About InCopy.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected InCopy crashes
  • Suspicious file opening events in application logs
  • Unusual process creation from InCopy

Network Indicators:

  • Outbound connections from InCopy to unknown IPs
  • DNS requests for suspicious domains after file opening

SIEM Query:

source="incopy" AND (event_type="crash" OR file_path="*.incopy" AND user_interaction="open")

🔗 References

📤 Share & Export