{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-20737","assignerOrgId":"078d4453-3bcd-4900-85e6-15281da43538","state":"PUBLISHED","assignerShortName":"adobe","dateReserved":"2023-12-04T16:52:22.971Z","datePublished":"2024-04-10T08:56:42.741Z","dateUpdated":"2024-08-01T21:59:42.950Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"After Effects","vendor":"Adobe","versions":[{"lessThanOrEqual":"23.6.2","status":"affected","version":"0","versionType":"semver"}]}],"datePublic":"2024-04-09T17:00:00.000Z","descriptions":[{"lang":"en","value":"After Effects versions 24.1, 23.6.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","availabilityRequirement":"NOT_DEFINED","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","confidentialityRequirement":"NOT_DEFINED","environmentalScore":5.5,"environmentalSeverity":"MEDIUM","exploitCodeMaturity":"NOT_DEFINED","integrityImpact":"NONE","integrityRequirement":"NOT_DEFINED","modifiedAttackComplexity":"LOW","modifiedAttackVector":"LOCAL","modifiedAvailabilityImpact":"NONE","modifiedConfidentialityImpact":"HIGH","modifiedIntegrityImpact":"NONE","modifiedPrivilegesRequired":"NONE","modifiedScope":"NOT_DEFINED","modifiedUserInteraction":"REQUIRED","privilegesRequired":"NONE","remediationLevel":"NOT_DEFINED","reportConfidence":"NOT_DEFINED","scope":"UNCHANGED","temporalScore":5.5,"temporalSeverity":"MEDIUM","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-125","description":"Out-of-bounds Read (CWE-125)","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"078d4453-3bcd-4900-85e6-15281da43538","shortName":"adobe","dateUpdated":"2024-04-10T08:56:42.741Z"},"references":[{"tags":["vendor-advisory"],"url":"https://helpx.adobe.com/security/products/after_effects/apsb24-09.html"}],"source":{"discovery":"EXTERNAL"},"title":"Adobe After Effect 2024 RGB File parsing Memory Corruption Vulnerability"},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-20737","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-04-10T13:37:07.299316Z"}}}],"affected":[{"cpes":["cpe:2.3:a:adobe:after_effects:-:*:*:*:*:*:*:*"],"vendor":"adobe","product":"after_effects","versions":[{"status":"affected","version":"-","versionType":"custom","lessThanOrEqual":"24.1"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:40:30.013Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:59:42.950Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://helpx.adobe.com/security/products/after_effects/apsb24-09.html"}]}]}}