Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN787
_____________________________________________________________________

DATE                : 12/11/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Adobe InDesign versions prior
                             to ID21.0, ID20.5.1.

=====================================================================
https://helpx.adobe.com/security/products/indesign/apsb25-106.html
_____________________________________________________________________



Security Update Available for Adobe InDesign | APSB25-106

Bulletin ID           Date Published             Priority

APSB25-106            November 11, 2025          3


Summary

Adobe has released a security update for Adobe InDesign.  This update
addresses critical vulnerabilities that could lead to arbitrary code
execution.

Adobe is not aware of any exploits in the wild for any of the issues
addressed in these updates.


Affected Versions

Product           Affected version              Platform

Adobe InDesign    ID20.5 and earlier versions   Windows and macOS 

Adobe InDesign    ID19.5.5 and earlier versions  Windows and macOS 


Solution

Adobe categorizes these updates with the following priority rating
and recommends users update their software installations via the
Creative Cloud desktop app updater, or by navigating to the InDesign
Help menu and clicking "Updates." For more information, please
reference this help page.

Product         Updated version       Platform     Priority rating

Adobe InDesign  ID21.0        Windows and macOS    3

Adobe InDesign  ID20.5.1      Windows and macOS    3

For managed environments, IT administrators can use the Creative
Cloud Packager to create deployment packages. Refer to this help
page for more information.


Vulnerability Details

Vulnerability Category    Vulnerability Impact   Severity
CVSS base score         CVSS vector      CVE Number

Use After Free (CWE-416)  Arbitrary code execution   Critical
7.8     CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H   
CVE-2025-61814

Use After Free (CWE-416)  Arbitrary code execution   Critical
7.8     CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2025-61815

Heap-based Buffer Overflow (CWE-122)   Arbitrary code execution
Critical   7.8    CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2025-61824

Heap-based Buffer Overflow (CWE-122)    Arbitrary code execution
Critical   7.8    CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2025-61832


Acknowledgments

Adobe would like to thank the following researchers for reporting
these issues and for working with Adobe to help protect our
customers:   

    yjdfy -- CVE-2025-61814, CVE-2025-61815
    Jony (jony_juice) -- CVE-2025-61824
    Francis Provencher (prl) -- CVE-2025-61832

NOTE: Adobe has a public bug bounty program with HackerOne. If you
are interested in working with Adobe as an external security
researcher, please check out https://hackerone.com/adobe

For more information, visit https://helpx.adobe.com/security.html,

or email PSIRT@adobe.com

=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




