Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-28827: Out-of-bounds Write (CWE-787) in Adobe FrameMaker

0
Medium
Published: Fri May 13 2022 (05/13/2022, 14:32:49 UTC)
Source: CVE
Vendor/Project: Adobe
Product: FrameMaker

Description

Adobe Framemaker versions 2029u8 (and earlier) and 2020u4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

AI-Powered Analysis

AILast updated: 06/23/2025, 09:06:14 UTC

Technical Analysis

CVE-2022-28827 is an out-of-bounds write vulnerability (CWE-787) affecting Adobe FrameMaker versions 2029u8 and earlier, as well as 2020u4 and earlier. This vulnerability arises when the software improperly handles memory boundaries during processing of certain input data, specifically when opening a maliciously crafted FrameMaker file. The out-of-bounds write can corrupt memory, potentially allowing an attacker to execute arbitrary code within the context of the current user. Successful exploitation requires user interaction, meaning the victim must open a malicious file, which could be delivered via email, shared drives, or other file transfer methods. There are no known exploits in the wild at this time, and no official patches or updates have been linked in the provided information. The vulnerability impacts confidentiality, integrity, and availability by enabling code execution that could lead to data theft, system compromise, or disruption of services. However, exploitation complexity is increased due to the need for user action and the absence of remote exploitation vectors. FrameMaker is a specialized desktop publishing software primarily used for technical documentation, which limits the scope of affected systems to organizations that utilize this product for document creation and management.

Potential Impact

For European organizations, the impact of CVE-2022-28827 depends largely on the extent of Adobe FrameMaker usage. Industries such as aerospace, manufacturing, engineering, and technical publishing, which rely on FrameMaker for complex documentation, are at higher risk. Exploitation could lead to unauthorized code execution, potentially resulting in data breaches, intellectual property theft, or disruption of critical documentation workflows. Since the vulnerability requires user interaction, phishing or social engineering campaigns targeting employees who handle FrameMaker files could be a vector. The compromise of user accounts could facilitate lateral movement within networks, especially if users have elevated privileges. Additionally, organizations with stringent compliance requirements (e.g., GDPR) could face regulatory consequences if sensitive data is exposed due to exploitation. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure. The medium severity rating reflects a balance between the potential impact and the exploitation complexity.

Mitigation Recommendations

European organizations should implement targeted mitigation strategies beyond generic patching advice. First, identify and inventory all systems running Adobe FrameMaker, focusing on versions 2029u8 and earlier and 2020u4 and earlier. Since no patch links are provided, coordinate with Adobe support or official channels to obtain or verify the availability of security updates. In the interim, restrict the opening of FrameMaker files from untrusted or external sources, employing email filtering and attachment sandboxing to detect malicious files. Enhance user awareness training specifically for employees handling FrameMaker documents, emphasizing the risks of opening unexpected or suspicious files. Implement application whitelisting and endpoint detection and response (EDR) solutions to monitor and block anomalous behavior indicative of exploitation attempts. Network segmentation can limit the spread if a device is compromised. Finally, establish robust backup and recovery procedures for critical documentation to mitigate potential data loss or corruption.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2022-04-08T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2ea3

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 9:06:14 AM

Last updated: 2/2/2026, 8:41:25 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20420: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20419: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20418: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT7931, MT7933

Unknown
VulnerabilityMon Feb 02 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats