
Cloud Vulnerability DB
A community-led vulnerabilities database
Adobe After Effects versions 23.6.6, 24.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability identified as CVE-2024-39380. The vulnerability was discovered by Francis Provencher (prl) and disclosed in September 2024. This security flaw affects both Windows and macOS operating systems running the specified versions of Adobe After Effects (Adobe Advisory, NVD).
The vulnerability is classified as a Heap-based Buffer Overflow (CWE-122) with a CVSS v3.1 base score of 7.8 (HIGH). The attack vector is Local (L) with Low attack complexity (L), requiring user interaction (UI:R) but no privileges (PR:N). The scope is unchanged (S:U) with High impact on confidentiality, integrity, and availability (C:H/I:H/A:H) (NVD).
If successfully exploited, this vulnerability could result in arbitrary code execution in the context of the current user. The severity of the impact depends on the user's privileges - users with administrative rights could be more severely impacted than those with restricted privileges (CIS Advisory).
Adobe has released version 23.6.9 to address this vulnerability. Users are strongly advised to update to the latest version through the Adobe Download Center. Organizations should apply the stable channel update provided by Adobe to vulnerable systems immediately after appropriate testing (CIS Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."