CVE-2025-30313
BaseFortify
Publication date: 2025-07-08
Last updated on: 2025-07-10
Assigner: Adobe Systems Incorporated
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| adobe | illustrator | From 28.0 (inc) to 28.7.8 (exc) |
| adobe | illustrator | From 29.0 (inc) to 29.6 (exc) |
| apple | macos | * |
| microsoft | windows | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds read in Adobe Illustrator versions 28.7.6, 29.5.1 and earlier. It occurs when a user opens a malicious file, which can cause the program to read memory outside the intended boundaries, potentially exposing sensitive information stored in memory.
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to disclosure of sensitive memory contents, which may include confidential or private information. However, exploitation requires user interaction, specifically opening a malicious file, and it does not affect integrity or availability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid opening files from untrusted or unknown sources in affected versions of Illustrator (28.7.6, 29.5.1 and earlier). Update Illustrator to a version later than 29.5.1 once a patch is available. Additionally, educate users about the risk of opening malicious files to reduce the chance of exploitation.