CVE-2025-64894

5.5 MEDIUM

📋 TL;DR

CVE-2025-64894 is an integer overflow vulnerability in DNG SDK versions 1.7.0 and earlier that allows attackers to cause denial-of-service by tricking users into opening malicious files. This affects applications and systems that process DNG (Digital Negative) image files using the vulnerable SDK. The vulnerability requires user interaction through file opening.

💻 Affected Systems

Products:
  • Adobe DNG SDK
Versions: 1.7.0 and earlier
Operating Systems: All platforms supported by DNG SDK
Default Config Vulnerable: ⚠️ Yes
Notes: Any application or system using DNG SDK to process DNG files is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash leading to denial-of-service, potentially disrupting workflows that rely on DNG file processing.

🟠

Likely Case

Application becomes unresponsive or crashes when processing specially crafted DNG files, requiring restart.

🟢

If Mitigated

No impact if malicious files are prevented from reaching users or if patched version is used.

🌐 Internet-Facing: LOW - Requires user interaction with malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted with malicious files via email or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple file opening required

Exploitation requires user to open malicious DNG file. No authentication bypass needed beyond file access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.1 or later

Vendor Advisory: https://helpx.adobe.com/security/products/dng-sdk/apsb25-118.html

Restart Required: Yes

Instructions:

1. Download DNG SDK version 1.7.1 or later from Adobe. 2. Replace vulnerable SDK files with patched version. 3. Recompile any applications using the SDK. 4. Restart affected applications/services.

🔧 Temporary Workarounds

File type restriction

all

Block or restrict DNG file processing in vulnerable applications

User awareness training

all

Train users not to open DNG files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of vulnerable DNG processing components
  • Use file integrity monitoring to detect unauthorized DNG file processing attempts

🔍 How to Verify

Check if Vulnerable:

Check DNG SDK version in use. If version is 1.7.0 or earlier, system is vulnerable.

Check Version:

Check SDK documentation or build configuration for version information

Verify Fix Applied:

Verify DNG SDK version is 1.7.1 or later and test with known safe DNG files.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing DNG files
  • Unexpected termination of DNG-related processes

Network Indicators:

  • Unusual DNG file downloads from untrusted sources

SIEM Query:

EventID: Application Crash AND ProcessName contains 'dng' OR FileExtension: '.dng'

🔗 References

📤 Share & Export