Skip to main content

CVE-2025-47120: Stack-based Buffer Overflow (CWE-121) in Adobe Adobe Framemaker

Medium
VulnerabilityCVE-2025-47120cvecve-2025-47120cwe-121
Published: Tue Jul 08 2025 (07/08/2025, 22:11:18 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Framemaker

Description

Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

AI-Powered Analysis

AILast updated: 07/08/2025, 22:42:49 UTC

Technical Analysis

CVE-2025-47120 is a stack-based buffer overflow vulnerability identified in Adobe FrameMaker versions 2020.8, 2022.6, and earlier. The vulnerability arises from improper handling of input data when processing FrameMaker files, which can lead to memory corruption on the stack. Specifically, a maliciously crafted FrameMaker document can trigger this overflow when opened by a user, potentially causing disclosure of sensitive memory contents. This vulnerability is classified under CWE-121, indicating a classic stack-based buffer overflow flaw. Exploitation requires user interaction, as the victim must open a malicious file, and no prior authentication is needed. The CVSS v3.1 base score is 5.5 (medium severity), with the vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N, meaning the attack requires local access (local vector), low attack complexity, no privileges required, user interaction required, unchanged scope, high impact on confidentiality, but no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow attackers to read sensitive memory data, potentially exposing confidential information stored in memory during FrameMaker operation, but does not allow code execution or system disruption directly.

Potential Impact

For European organizations, the impact of CVE-2025-47120 primarily concerns confidentiality breaches. Organizations using Adobe FrameMaker for technical documentation, publishing, or content creation may risk exposure of sensitive information if users open maliciously crafted files. This is particularly critical in sectors handling proprietary or regulated data, such as aerospace, automotive, pharmaceuticals, and government agencies, where FrameMaker is commonly used for complex documentation. The lack of integrity or availability impact reduces the risk of operational disruption, but the confidentiality compromise could lead to intellectual property theft or leakage of sensitive project details. Since exploitation requires user interaction and local access (e.g., opening a file), the threat vector is limited to targeted attacks or insider threats rather than widespread remote exploitation. European organizations with distributed teams exchanging FrameMaker files via email or shared drives could be vulnerable to social engineering attacks leveraging this flaw. The medium severity score reflects a moderate risk that should be addressed promptly to prevent potential data leaks.

Mitigation Recommendations

Given the absence of an official patch at this time, European organizations should implement several specific mitigations: 1) Enforce strict file handling policies, including restricting FrameMaker file exchanges to trusted sources and scanning incoming files with advanced malware detection tools capable of analyzing document content. 2) Educate users on the risks of opening unsolicited or unexpected FrameMaker files, emphasizing verification of file origin before opening. 3) Employ application whitelisting and sandboxing techniques to isolate FrameMaker processes, limiting the impact of any exploitation attempt. 4) Monitor FrameMaker application behavior and system memory access patterns for anomalies indicative of exploitation attempts. 5) Coordinate with Adobe for timely updates and apply patches immediately upon release. 6) Consider disabling or limiting FrameMaker usage in high-risk environments until a patch is available. 7) Implement network segmentation to reduce the risk of lateral movement if an endpoint is compromised through this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-30T20:47:55.002Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d9a9f6f40f0eb72fbf84a

Added to database: 7/8/2025, 10:24:31 PM

Last enriched: 7/8/2025, 10:42:49 PM

Last updated: 8/13/2025, 8:50:58 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats