Adobe uncovered a new arbitrary code execution vulnerability (ACE) in Adobe After Effects. The flaw, which is tracked as CVE-2022-23200, has a base score of 7.8 out of 10.0 in the CVSS scoring system. The successful exploitation of this vulnerability may lead to arbitrary code execution in the context of the current user. Since it is a high severity vulnerability with code execution permissions, it is good to fix the flaw before join the list of victims. Let’s see how to Fix the new ACE vulnerability in Adobe After Effects (AE).
After Effects (AE) is a popular photo and video editing program developed by Adobe. It gains high tractions because of its professional toolset. Its toolset allows editors to complete any kind of creative editing work from basic editing to character animation, object removal from video clips, 3D designs, and more. It is a subscription-based product. You will have to pay to enroll in its subscription. You can visit this link to download or know more about the product.
The flaw lice in improper parsing of 3GP files. Adobe said, affected versions of After Effects failed to properly validate user-supplied data, which can result in a write past the end of an allocated structure. This allows remote attackers to execute code in the context of the current process.
Researchers say that the flaw can’t be exploited without user interaction. Threat actors should trick the victim to visit a malicious page or open a malicious file to exploit the CVE-2022-23200 vulnerability.
Associated CVE ID | CVE-2022-23200 |
Description | Arbitrary code execution vulnerability in Adobe After Effects |
Associated ZDI ID | ZDI-CAN-15254 |
CVSS Score | 7.8 Medium |
Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Impact Score | – |
Exploitability Score | – |
Attack Vector (AV) | Local |
Attack Complexity (AC) | Low |
Privilege Required (PR) | None |
User Interaction (UI) | Required |
Scope | Unchanged |
Confidentiality (C) | High |
Integrity (I) | High |
availability (a) | High |
The vendor says that AE v22.1.1 and v18.4.3 and earlier are vulnerable to the CVE-2022-23200 Vulnerability. Users of Windows and Mac are urged to take action at the earliest.
Product | Version | Platform |
---|---|---|
Adobe After Effects | 22.1.1 and earlier versions | Windows and macOS |
Adobe After Effects | 18.4.3 and earlier versions | Windows and macOS |
Adobe has responded to the vulnerability by releasing patches to fix it. Adobe recommends users update their After Effects to the latest available version. Here you can see the patched version details in the table.
Product | Version | Platform | Priority Rating | Availability |
---|---|---|---|---|
Adobe After Effects | 22.2 | Windows and macOS | 3 | Download Center |
Adobe After Effects | 18.4.4 | Windows and macOS | 3 | Download Center |
Although you can download and apply the updates, Adobe recommends using the Creative Cloud desktop app. The app supports updating multiple Adobe products to the latest versions.
You can also use the Creative Cloud desktop app to enable auto-update, control auto-updates for individual apps, manual update of all or selected products.
Download the Creative Cloud App from here. Then install the app using your registered Adobe account or email ID.
Open the Creative Cloud desktop app. Click on the Account icon in the upper right, then select Preferences.
.
Selects the Aps tab the do any of the following.
All apps To set automatic updates for all apps, turn on Auto-update.
Specific apps To choose the auto-update setting for specific apps, turn on Auto-update, then set the toggle as needed for each individual app.
Visit this page for more information.
We hope this post would help you know How to Fix the New ACE Vulnerability in Adobe After Effects- CVE-2022-23200. Thanks for reading this threat post. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.