CVE-2025-64896: Creation of Temporary File in Directory with Incorrect Permissions (CWE-379) in Adobe Creative Cloud Desktop
CVE-2025-64896 is a medium severity vulnerability in Adobe Creative Cloud Desktop versions 6. 4. 0. 361 and earlier, involving the creation of temporary files in directories with incorrect permissions (CWE-379). This flaw can be exploited by an attacker to cause a denial-of-service (DoS) condition by manipulating these temporary files, disrupting application functionality. Exploitation requires user interaction, specifically opening a malicious file. The vulnerability does not impact confidentiality or integrity but affects availability. No known exploits are currently reported in the wild. Organizations using affected Adobe Creative Cloud Desktop versions should prioritize patching once available and implement strict file permission policies to mitigate risk. European countries with high usage of Adobe Creative Cloud, especially in creative industries, are more likely to be impacted.
AI Analysis
Technical Summary
CVE-2025-64896 is a vulnerability identified in Adobe Creative Cloud Desktop versions 6.4.0.361 and earlier, classified under CWE-379, which concerns the creation of temporary files in directories with incorrect permissions. This security weakness allows an attacker to exploit the application by manipulating temporary files that the software creates during its operation. Because these temporary files are stored with improper permissions, an attacker with local access or through a crafted malicious file can interfere with the application's normal functioning, potentially causing a denial-of-service (DoS) condition. The attack vector requires user interaction, meaning the victim must open a malicious file to trigger the vulnerability. The CVSS v3.1 base score is 5.5, indicating a medium severity level, with the vector string AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, which translates to local attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or integrity impact, but high impact on availability. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability primarily affects the availability of the Adobe Creative Cloud Desktop application, potentially disrupting workflows that depend on it. Given Adobe Creative Cloud's widespread use in creative and design sectors, this vulnerability could impact productivity and operational continuity if exploited.
Potential Impact
For European organizations, the primary impact of CVE-2025-64896 is the potential denial-of-service of Adobe Creative Cloud Desktop, which could disrupt creative workflows, project timelines, and collaboration efforts. Industries such as media, advertising, design, and digital content creation, which heavily rely on Adobe Creative Cloud tools, may experience operational downtime or degraded performance. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can lead to significant productivity losses and potential financial consequences. Additionally, organizations with strict compliance requirements around operational continuity may face challenges if this vulnerability is exploited. The requirement for user interaction limits the attack surface but does not eliminate risk, especially in environments where users frequently handle files from external or untrusted sources. The absence of known exploits reduces immediate threat but does not preclude future exploitation, making proactive mitigation critical.
Mitigation Recommendations
To mitigate CVE-2025-64896, organizations should implement the following specific measures: 1) Monitor Adobe's official channels for patches or updates addressing this vulnerability and apply them promptly once available. 2) Enforce strict file system permissions on directories used by Adobe Creative Cloud Desktop to store temporary files, ensuring that only authorized users and processes have write access. 3) Educate users about the risks of opening files from untrusted or unknown sources to reduce the likelihood of triggering the vulnerability via malicious files. 4) Employ endpoint protection solutions capable of detecting and blocking suspicious file manipulations or anomalous application behavior related to temporary file handling. 5) Consider application whitelisting or sandboxing techniques to limit the impact of potential exploitation. 6) Regularly audit and review user permissions and system configurations to prevent privilege escalation or unauthorized file access. 7) Implement network segmentation to isolate critical creative workstations, minimizing lateral movement if exploitation occurs. These targeted actions go beyond generic advice by focusing on controlling file permissions, user behavior, and system configurations specific to the vulnerability's exploitation vector.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-64896: Creation of Temporary File in Directory with Incorrect Permissions (CWE-379) in Adobe Creative Cloud Desktop
Description
CVE-2025-64896 is a medium severity vulnerability in Adobe Creative Cloud Desktop versions 6. 4. 0. 361 and earlier, involving the creation of temporary files in directories with incorrect permissions (CWE-379). This flaw can be exploited by an attacker to cause a denial-of-service (DoS) condition by manipulating these temporary files, disrupting application functionality. Exploitation requires user interaction, specifically opening a malicious file. The vulnerability does not impact confidentiality or integrity but affects availability. No known exploits are currently reported in the wild. Organizations using affected Adobe Creative Cloud Desktop versions should prioritize patching once available and implement strict file permission policies to mitigate risk. European countries with high usage of Adobe Creative Cloud, especially in creative industries, are more likely to be impacted.
AI-Powered Analysis
Technical Analysis
CVE-2025-64896 is a vulnerability identified in Adobe Creative Cloud Desktop versions 6.4.0.361 and earlier, classified under CWE-379, which concerns the creation of temporary files in directories with incorrect permissions. This security weakness allows an attacker to exploit the application by manipulating temporary files that the software creates during its operation. Because these temporary files are stored with improper permissions, an attacker with local access or through a crafted malicious file can interfere with the application's normal functioning, potentially causing a denial-of-service (DoS) condition. The attack vector requires user interaction, meaning the victim must open a malicious file to trigger the vulnerability. The CVSS v3.1 base score is 5.5, indicating a medium severity level, with the vector string AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, which translates to local attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or integrity impact, but high impact on availability. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability primarily affects the availability of the Adobe Creative Cloud Desktop application, potentially disrupting workflows that depend on it. Given Adobe Creative Cloud's widespread use in creative and design sectors, this vulnerability could impact productivity and operational continuity if exploited.
Potential Impact
For European organizations, the primary impact of CVE-2025-64896 is the potential denial-of-service of Adobe Creative Cloud Desktop, which could disrupt creative workflows, project timelines, and collaboration efforts. Industries such as media, advertising, design, and digital content creation, which heavily rely on Adobe Creative Cloud tools, may experience operational downtime or degraded performance. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can lead to significant productivity losses and potential financial consequences. Additionally, organizations with strict compliance requirements around operational continuity may face challenges if this vulnerability is exploited. The requirement for user interaction limits the attack surface but does not eliminate risk, especially in environments where users frequently handle files from external or untrusted sources. The absence of known exploits reduces immediate threat but does not preclude future exploitation, making proactive mitigation critical.
Mitigation Recommendations
To mitigate CVE-2025-64896, organizations should implement the following specific measures: 1) Monitor Adobe's official channels for patches or updates addressing this vulnerability and apply them promptly once available. 2) Enforce strict file system permissions on directories used by Adobe Creative Cloud Desktop to store temporary files, ensuring that only authorized users and processes have write access. 3) Educate users about the risks of opening files from untrusted or unknown sources to reduce the likelihood of triggering the vulnerability via malicious files. 4) Employ endpoint protection solutions capable of detecting and blocking suspicious file manipulations or anomalous application behavior related to temporary file handling. 5) Consider application whitelisting or sandboxing techniques to limit the impact of potential exploitation. 6) Regularly audit and review user permissions and system configurations to prevent privilege escalation or unauthorized file access. 7) Implement network segmentation to isolate critical creative workstations, minimizing lateral movement if exploitation occurs. These targeted actions go beyond generic advice by focusing on controlling file permissions, user behavior, and system configurations specific to the vulnerability's exploitation vector.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- adobe
- Date Reserved
- 2025-11-11T22:48:38.847Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693889e152fe50f9a4851f97
Added to database: 12/9/2025, 8:43:13 PM
Last enriched: 12/16/2025, 9:11:21 PM
Last updated: 2/7/2026, 10:45:44 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.