CVE-2023-26370 Overview
CVE-2023-26370 is an Access of Uninitialized Pointer vulnerability affecting Adobe Photoshop versions 23.5.5 (and earlier) and 24.7 (and earlier). This vulnerability could result in arbitrary code execution in the context of the current user. Exploitation requires user interaction, specifically requiring a victim to open a malicious file crafted by an attacker.
Critical Impact
Successful exploitation allows attackers to execute arbitrary code with the privileges of the current user, potentially leading to complete system compromise, data theft, or installation of malware.
Affected Products
- Adobe Photoshop 2022 (versions 23.5.5 and earlier)
- Adobe Photoshop 2023 (versions 24.7 and earlier)
- Adobe Photoshop 2024
- Affected platforms: Microsoft Windows and Apple macOS
Discovery Timeline
- October 11, 2023 - CVE-2023-26370 published to NVD
- November 21, 2024 - Last updated in NVD database
Technical Details for CVE-2023-26370
Vulnerability Analysis
This vulnerability is classified as CWE-824: Access of Uninitialized Pointer. When Adobe Photoshop processes a specially crafted malicious file, the application may attempt to use a pointer variable before it has been properly initialized. This uninitialized pointer can contain arbitrary memory values, leading to unpredictable behavior when the pointer is dereferenced.
The local attack vector requires an attacker to convince a user to open a malicious file, which could be delivered through phishing emails, malicious websites, or compromised file-sharing platforms. Once the victim opens the crafted file in a vulnerable version of Photoshop, the attacker gains code execution capabilities within the context of the current user session.
Root Cause
The root cause of this vulnerability lies in improper memory initialization within Adobe Photoshop's file parsing routines. When certain file types are processed, the application fails to initialize pointer variables before use, leaving them in an undefined state. An attacker can craft a malicious file that manipulates memory layout to control the uninitialized pointer value, redirecting program execution flow to attacker-controlled code.
Attack Vector
The attack requires local access in the form of a malicious file that must be opened by the victim. Attack scenarios include:
- Phishing campaigns - Attackers send emails with malicious Photoshop-compatible files (PSD, TIFF, or other supported formats) disguised as legitimate documents
- Watering hole attacks - Compromised websites serving malicious image files targeting creative professionals
- Supply chain attacks - Malicious files distributed through compromised asset repositories or design collaboration platforms
The attacker crafts a file that triggers the uninitialized pointer access during parsing. By carefully controlling the memory state, the attacker can redirect execution to shellcode or perform a ROP (Return-Oriented Programming) attack to achieve arbitrary code execution.
Detection Methods for CVE-2023-26370
Indicators of Compromise
- Unusual process behavior from Adobe Photoshop, including unexpected child processes or network connections
- Crash dumps from Photoshop indicating memory access violations or segmentation faults during file parsing
- Suspicious file access patterns where Photoshop opens files from untrusted locations (temp directories, download folders)
- Memory forensics showing signs of shellcode execution or ROP chain artifacts in Photoshop process space
Detection Strategies
- Deploy endpoint detection rules to monitor Adobe Photoshop for anomalous behavior such as spawning command shells or making suspicious system calls
- Implement file scanning for malformed or suspicious Photoshop-compatible files at email gateways and web proxies
- Monitor process creation events where photoshop.exe or Adobe Photoshop spawns unexpected child processes
- Utilize memory protection mechanisms to detect exploitation attempts targeting uninitialized pointer vulnerabilities
Monitoring Recommendations
- Enable enhanced logging for Adobe Photoshop application events and crashes
- Configure SentinelOne's behavioral AI to flag unusual activity from creative software applications
- Implement network monitoring for Photoshop processes making unexpected outbound connections
- Deploy canary files and honeypots in design asset directories to detect potential exploitation attempts
How to Mitigate CVE-2023-26370
Immediate Actions Required
- Update Adobe Photoshop 2022 to version 23.5.6 or later immediately
- Update Adobe Photoshop 2023 to version 24.7.1 or later immediately
- Educate users about the risks of opening files from untrusted sources
- Implement application allowlisting to prevent unauthorized code execution
- Consider temporarily restricting Photoshop's ability to open files from untrusted network locations
Patch Information
Adobe has released security updates addressing this vulnerability as documented in Adobe Photoshop Security Advisory APSB23-51. Organizations should prioritize updating to the patched versions:
- Photoshop 2022: Update to version 23.5.6 or later
- Photoshop 2023/2024: Update to version 24.7.1 or later
The patches can be obtained through Adobe Creative Cloud application updates or direct download from Adobe's security portal.
Workarounds
- If immediate patching is not possible, restrict Photoshop from opening files downloaded from the internet by blocking macro-enabled or untrusted file types
- Implement strict email filtering to quarantine Photoshop-compatible file attachments for scanning before delivery
- Use sandboxed environments or virtual machines for opening files from untrusted sources
- Deploy endpoint protection solutions like SentinelOne to detect and block exploitation attempts through behavioral analysis
# Example: Configure Windows Defender Application Control policy to restrict Photoshop file associations
# Add to WDAC policy XML to restrict execution from download directories
<FileRules>
<FileAttrib Id="ID_FILEATTRIB_PHOTOSHOP_RESTRICT"
FriendlyName="Restrict Photoshop Downloads"
MinimumFileVersion="0.0.0.0"
FileName="photoshop.exe"/>
</FileRules>
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

