Attention Adobe Dimension users! A security vulnerability has been discovered in Adobe Dimension version 3.4.8 and earlier versions that could lead to potential arbitrary code execution. This vulnerability is a critical issue, and users should take immediate action to secure their systems against potential attacks.

What is the Vulnerability?

Common Vulnerabilities and Exposures (CVE) identifier CVE-2023-26372 has been assigned to an out-of-bounds write vulnerability in Adobe Dimension 3.4.8 and earlier versions. This vulnerability could allow an attacker to execute arbitrary code on a user's system in the context of the current user.

Exploitation of this vulnerability requires user interaction. To successfully exploit the vulnerability, an attacker must trick a victim into opening a malicious file, which then would trigger the out-of-bounds write vulnerability and potentially result in arbitrary code execution.

The vulnerability lies within the processing of certain file formats by Adobe Dimension. When reading malformed headers or data, a memory corruption occurs leading to the out-of-bounds write, and subsequently creating the possibility for arbitrary code execution.

Code Snippet

Below is a generic code snippet that helps showcase the out-of-bounds write vulnerability.

#include <stdio.h>
#include <stdlib.h>

int main() {
    int length = 10;
    int *array;

    array = (int *) malloc(length * sizeof(int));

    for (size_t i = ; i <= length; i++) {
        array[i] = i * 2; // This operation causes out-of-bounds write

    printf("Successfully wrote data...\n");


    return ;

This code snippet demonstrates writing data out-of-bounds on an integer array, causing memory corruption which could lead to the execution of arbitrary code by an attacker.

Original References and Official Advisory

The vulnerability was discovered and reported by security researchers, and it was acknowledged by Adobe in its security bulletin APSB22-XX.

Adobe has acknowledged the vulnerability and has provided patches and guidance for addressing the issue. Users are highly recommended to update their software to the latest version as it contains a fix for this vulnerability.

Exploit Details

As of now, there are no known public exploits available for CVE-2023-26372. However, users should still treat this as a critical issue and update their Adobe Dimension software to the patched version. There is the possibility that threat actors could develop proof-of-concept code or a working exploit in the future, making it crucial to apply the patches provided by Adobe.

For users who cannot immediately update, it is recommended to be extra vigilant when opening files and ensure they are from legitimate sources. If a suspicious file is received, users should not open it and delete it immediately to prevent unintentional exploitation of the vulnerability.


CVE-2023-26372 is a critical vulnerability that affects Adobe Dimension 3.4.8 and earlier versions. Users should update their software as soon as possible to protect themselves from potential attacks. By staying vigilant and always double-checking file sources before opening them, users can further help to safeguard their systems from vulnerabilities like CVE-2023-26372.


Published on: 04/12/2023 20:15:00 UTC
Last modified on: 04/14/2023 03:41:00 UTC