CVE-2018-4878

Summary

CVECVE-2018-4878
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2018-02-06 21:29:00 UTC
Updated2022-04-18 14:26:00 UTC
DescriptionA use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.

Risk And Classification

EPSS: 0.933610000 probability, percentile 0.998090000 (date 2026-04-02)

CISA KEV: Listed on 2021-11-03; due 2022-05-03; ransomware use Known

Problem Types: CWE-416

CISA Known Exploited Vulnerability

VendorAdobe
ProductFlash Player
NameAdobe Flash Player Use-After-Free Vulnerability
Required ActionThe impacted product is end-of-life and should be disconnected if still in use.
Noteshttps://nvd.nist.gov/vuln/detail/CVE-2018-4878

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Adobe Flash Player All All All All
Application Adobe Flash Player All All All All
Application Adobe Flash Player All All All All
Application Adobe Flash Player All All All All
Application Adobe Flash Player All All All All
Application Adobe Flash Player All All All All
Application Adobe Flash Player All All All All
Application Adobe Flash Player All All All All
Operating System Apple Macos - All All All
Operating System Apple Mac Os - All All All
Operating System Apple Mac Os - All All All
Operating System Google Chrome Os - All All All
Operating System Google Chrome Os - All All All
Operating System Linux Linux Kernel - All All All
Operating System Linux Linux Kernel - All All All
Operating System Microsoft Windows - All All All
Operating System Microsoft Windows - All All All
Operating System Microsoft Windows 10 All All All All
Operating System Microsoft Windows 10 All All All All
Operating System Microsoft Windows 8.1 All All All All
Operating System Microsoft Windows 8.1 All All All All
Operating System Redhat Enterprise Linux Desktop 6.0 All All All
Operating System Redhat Enterprise Linux Desktop 6.0 All All All
Operating System Redhat Enterprise Linux Server 6.0 All All All
Operating System Redhat Enterprise Linux Server 6.0 All All All
Operating System Redhat Enterprise Linux Workstation 6.0 All All All
Operating System Redhat Enterprise Linux Workstation 6.0 All All All

References

ReferenceSourceLinkTags
Flash Exploit, CVE-2018-4878, Spotted in The Wild as Part of Massive Malspam Campaign MISC blog.morphisec.com Third Party Advisory
North Korean Hackers Allegedly Exploit Adobe Flash Player Vulnerability (CVE-2018-4878) Against South Korean Targets - Security News - Trend Micro USA MISC www.trendmicro.com Technical Description, Third Party Advisory
Adobe Flash Player Use-After-Free Memory Error Lets Remote Users Execute Arbitrary Code - SecurityTracker SECTRACK www.securitytracker.com Third Party Advisory, VDB Entry
Adobe Flash < 28.0.0.161 - Use-After-Free - Multiple remote Exploit EXPLOIT-DB www.exploit-db.com
Talos Blog || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: Flash 0-Day In The Wild: Group 123 At The Controls MISC blog.talosintelligence.com Technical Description, Third Party Advisory
Adobe Flash Player Zero-Day Spotted in the Wild | The first stop for security news | Threatpost MISC threatpost.com Third Party Advisory
Adobe Flash Vulnerability Reappears in Malicious ... MISC www.darkreading.com Third Party Advisory
malware-samples/CVE-2018-4878-Adobe-Flash-DRM-UAF-0day at master · InQuest/malware-samples · GitHub MISC github.com Third Party Advisory
How Hackers Bypassed an Adobe Flash Protection Mechanism | McAfee Blogs MISC securingtomorrow.mcafee.com
GitHub - vysec/CVE-2018-4878: Aggressor Script to launch IE driveby for CVE-2018-4878 MISC github.com Third Party Advisory
Adobe Security Bulletin MISC helpx.adobe.com Vendor Advisory
Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations « Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations | FireEye Inc MISC www.fireeye.com Third Party Advisory
Adobe Flash Player CVE-2018-4878 Use After Free Remote Code Execution Vulnerability BID www.securityfocus.com Third Party Advisory, VDB Entry
Red Hat Customer Portal REDHAT access.redhat.com Third Party Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
CISA Known Exploited Vulnerabilities catalog CISA www.cisa.gov kev

Legacy QID Mappings

  • 690574 Free Berkeley Software Distribution (FreeBSD) Security Update for flash player (756a8631-0b84-11e8-a986-6451062f0f7a)
  • 710234 Gentoo Linux Adobe Flash Player Multiple Vulnerabilities (GLSA 201803-08)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report