First published: Mon Sep 19 2022(Updated: )
Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Bridge | >=11.1<11.1.4 | |
Adobe Bridge | >=12.0<12.0.3 | |
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38425 is a vulnerability in Adobe Bridge versions 12.0.2 and earlier, and 11.1.3 and earlier, that allows for a Use After Free attack leading to disclosure of sensitive memory.
The CVE-2022-38425 vulnerability affects Adobe Bridge versions 12.0.2 and earlier, and 11.1.3 and earlier, by enabling an attacker to exploit a Use After Free vulnerability, potentially bypassing ASLR and disclosing sensitive memory.
The severity of CVE-2022-38425 is rated as medium with a severity value of 5.5.
An attacker can exploit CVE-2022-38425 by leveraging the Use After Free vulnerability in Adobe Bridge, which requires user interaction to initiate the attack.
To mitigate the CVE-2022-38425 vulnerability, it is recommended to update Adobe Bridge to version 12.0.3 or later, or version 11.1.4 or later.