CVE-2025-47135
BaseFortify
Publication date: 2025-07-08
Last updated on: 2025-07-11
Assigner: Adobe Systems Incorporated
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| adobe | dimension | to 4.1.3 (exc) |
| apple | macos | * |
| microsoft | windows | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds read in Dimension versions 4.1.2 and earlier. It allows an attacker to read sensitive memory beyond the intended boundaries, potentially disclosing sensitive information. Exploiting this requires the victim to open a malicious file, and it can be used to bypass security mitigations like ASLR.
How can this vulnerability impact me? :
The vulnerability can lead to disclosure of sensitive memory, which may expose confidential information. Since it can bypass mitigations such as ASLR, it increases the risk of further exploitation. However, exploitation requires user interaction by opening a malicious file.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid opening malicious files that could exploit the out-of-bounds read issue. Ensure users are aware not to open suspicious files. Additionally, update Dimension to a version later than 4.1.2 once available to fix the vulnerability.