CVE-2025-49527
BaseFortify
Publication date: 2025-07-08
Last updated on: 2025-07-10
Assigner: Adobe Systems Incorporated
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| adobe | illustrator | From 28.0 (inc) to 28.7.8 (exc) |
| adobe | illustrator | From 29.0 (inc) to 29.6 (exc) |
| apple | macos | * |
| microsoft | windows | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack-based buffer overflow in Adobe Illustrator versions 28.7.6, 29.5.1 and earlier. It can allow an attacker to execute arbitrary code with the privileges of the current user. Exploitation requires the victim to open a specially crafted malicious file.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker to run arbitrary code on your system with your user privileges, potentially leading to data theft, system compromise, or other malicious activities. However, exploitation requires user interaction by opening a malicious file.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update Adobe Illustrator to a version later than 28.7.6 or 29.5.1, as these versions are affected. Additionally, avoid opening files from untrusted or unknown sources to prevent exploitation that requires user interaction.