Skip to main content

CVE-2025-47104: Out-of-bounds Read (CWE-125) in Adobe InDesign Desktop

Medium
VulnerabilityCVE-2025-47104cvecve-2025-47104cwe-125
Published: Tue Jun 10 2025 (06/10/2025, 16:23:01 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: InDesign Desktop

Description

InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

AI-Powered Analysis

AILast updated: 07/10/2025, 21:47:04 UTC

Technical Analysis

CVE-2025-47104 is an out-of-bounds read vulnerability (CWE-125) affecting Adobe InDesign Desktop versions ID20.2, ID19.5.3, and earlier. This vulnerability allows an attacker to read memory outside the intended buffer boundaries, potentially disclosing sensitive information from the process memory. The flaw can be exploited when a user opens a specially crafted malicious InDesign file, which triggers the out-of-bounds read condition. The vulnerability is significant because it can be leveraged to bypass security mitigations such as Address Space Layout Randomization (ASLR), which is designed to prevent attackers from reliably predicting memory addresses. By leaking memory contents, an attacker can gain insights into the memory layout, facilitating further exploitation such as code execution or privilege escalation. However, exploitation requires user interaction (opening a malicious file), and no privileges are required to exploit the vulnerability. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the attack vector as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), high confidentiality impact (C:H), no integrity or availability impact (I:N/A:N). There are no known exploits in the wild at the time of publication, and no patches have been linked yet, indicating that organizations should prioritize monitoring and prepare for patch deployment once available.

Potential Impact

For European organizations, the impact of CVE-2025-47104 centers on potential sensitive data disclosure from Adobe InDesign Desktop processes. Organizations in sectors such as media, publishing, advertising, and design—where InDesign is widely used—may face risks of intellectual property leakage or exposure of confidential project data. The ability to bypass ASLR increases the risk of subsequent targeted attacks, potentially leading to more severe compromises if combined with other vulnerabilities. Since exploitation requires user interaction, the threat is primarily from targeted phishing or social engineering campaigns delivering malicious InDesign files. The medium severity score suggests moderate risk; however, the confidentiality impact is high, which is critical for organizations handling sensitive or regulated data under GDPR. Disclosed memory could include cryptographic keys, credentials, or proprietary information. The lack of known exploits reduces immediate risk but does not eliminate it, especially as attackers may develop exploits rapidly after vulnerability disclosure. European organizations should be aware of this threat to prevent data breaches and maintain compliance with data protection regulations.

Mitigation Recommendations

Specific mitigation steps include: 1) Educate users, especially designers and content creators, about the risks of opening unsolicited or unexpected InDesign files, emphasizing caution with email attachments and downloads. 2) Implement strict email filtering and sandboxing to detect and block malicious InDesign files before reaching end users. 3) Use endpoint protection solutions capable of detecting anomalous behavior related to Adobe InDesign processes. 4) Monitor network and host logs for unusual activity following file openings, such as memory access anomalies or process crashes. 5) Once Adobe releases patches, prioritize rapid deployment across all affected InDesign Desktop versions to eliminate the vulnerability. 6) Employ application whitelisting to restrict execution of unauthorized files and scripts within the design environment. 7) Consider isolating InDesign workstations from sensitive network segments to limit potential lateral movement if exploitation occurs. These measures go beyond generic advice by focusing on user behavior, detection, and environment segmentation tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-30T20:47:55.001Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f531b0bd07c39389e6d

Added to database: 6/10/2025, 6:54:11 PM

Last enriched: 7/10/2025, 9:47:04 PM

Last updated: 8/9/2025, 12:31:14 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats