CVE-2025-30321
BaseFortify
Publication date: 2025-06-10
Last updated on: 2025-06-16
Assigner: Adobe Systems Incorporated
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| adobe | indesign | to 19.5.4 (exc) |
| adobe | indesign | From 20.0 (inc) to 20.3 (exc) |
| apple | macos | * |
| microsoft | windows | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL Pointer Dereference in Adobe InDesign Desktop versions ID20.2, ID19.5.3 and earlier. It can be triggered when a user opens a malicious file, causing the application to crash and resulting in a denial-of-service condition.
How can this vulnerability impact me? :
The vulnerability can cause the Adobe InDesign application to crash, leading to disruption of service. This denial-of-service impact means users may lose access to the application temporarily and experience interruptions in their workflow.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid opening malicious files in affected versions of InDesign Desktop (ID20.2, ID19.5.3 and earlier). Ensure users are aware not to open untrusted files. Consider updating to a later version of the software if available. Since exploitation requires user interaction, user education and cautious handling of files can reduce risk.