{"api_version":"1","generated_at":"2026-04-23T06:21:30+00:00","cve":"CVE-2022-30674","urls":{"html":"https://cve.report/CVE-2022-30674","api":"https://cve.report/api/cve/CVE-2022-30674.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-30674","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-30674"},"summary":{"title":"CVE-2022-30674","description":"Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","state":"PUBLIC","assigner":"psirt@adobe.com","published_at":"2022-09-16 18:15:00","updated_at":"2023-11-07 03:47:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://helpx.adobe.com/security/products/indesign/apsb22-50.html","name":"https://helpx.adobe.com/security/products/indesign/apsb22-50.html","refsource":"MISC","tags":[],"title":"Adobe Security Bulletin","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCGBVQQ47URGJAZWHCISHDWF6QBTV2LE/","name":"FEDORA-2022-c22feb71ba","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: mingw-expat-2.4.9-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQB6FJAM5YQ35SF5B2MN25Y2FX56EOEZ/","name":"FEDORA-2022-dcb1d7bcb1","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: mingw-expat-2.4.9-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GSVZN3IJ6OCPSJL7AEX3ZHSHAHFOGESK/","name":"FEDORA-2022-d93b3bd8b9","refsource":"","tags":[],"title":"[SECURITY] Fedora 36 Update: mingw-expat-2.4.9-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSVZN3IJ6OCPSJL7AEX3ZHSHAHFOGESK/","name":"FEDORA-2022-d93b3bd8b9","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: mingw-expat-2.4.9-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCGBVQQ47URGJAZWHCISHDWF6QBTV2LE/","name":"FEDORA-2022-c22feb71ba","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: mingw-expat-2.4.9-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQB6FJAM5YQ35SF5B2MN25Y2FX56EOEZ/","name":"FEDORA-2022-dcb1d7bcb1","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: mingw-expat-2.4.9-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-30674","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30674","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"30674","vulnerable":"1","versionEndIncluding":"16.4.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"adobe","cpe5":"indesign","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"30674","vulnerable":"1","versionEndIncluding":"17.3","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"adobe","cpe5":"indesign","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"30674","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"30674","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"30674","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"30674","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"37","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"30674","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-30674","qid":"283259","title":"Fedora Security Update for mingw (FEDORA-2022-c22feb71ba)"},{"cve":"CVE-2022-30674","qid":"283260","title":"Fedora Security Update for mingw (FEDORA-2022-d93b3bd8b9)"},{"cve":"CVE-2022-30674","qid":"283462","title":"Fedora Security Update for mingw (FEDORA-2022-dcb1d7bcb1)"},{"cve":"CVE-2022-30674","qid":"377584","title":"Adobe InDesign Arbitrary File System Read Vulnerability (APSB22-50)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"psirt@adobe.com","DATE_PUBLIC":"2022-09-13T23:00:00.000Z","ID":"CVE-2022-30674","STATE":"PUBLIC","TITLE":"Adobe InDesign 2022 Out-of-Bound Read Memory leak"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"InDesign","version":{"version_data":[{"version_affected":"<=","version_value":"16.4.2"},{"version_affected":"<=","version_value":"17.3"},{"version_affected":"<=","version_value":"None"},{"version_affected":"<=","version_value":"None"}]}}]},"vendor_name":"Adobe"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}]},"impact":{"cvss":{"attackComplexity":"Low","attackVector":"Local","availabilityImpact":"None","baseScore":5.5,"baseSeverity":"Medium","confidentialityImpact":"High","integrityImpact":"None","privilegesRequired":"None","scope":"Unchanged","userInteraction":"Required","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Out-of-bounds Read (CWE-125)"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://helpx.adobe.com/security/products/indesign/apsb22-50.html","name":"https://helpx.adobe.com/security/products/indesign/apsb22-50.html"},{"refsource":"FEDORA","name":"FEDORA-2022-d93b3bd8b9","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSVZN3IJ6OCPSJL7AEX3ZHSHAHFOGESK/"},{"refsource":"FEDORA","name":"FEDORA-2022-c22feb71ba","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCGBVQQ47URGJAZWHCISHDWF6QBTV2LE/"},{"refsource":"FEDORA","name":"FEDORA-2022-dcb1d7bcb1","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQB6FJAM5YQ35SF5B2MN25Y2FX56EOEZ/"}]},"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-09-16 18:15:00","lastModifiedDate":"2023-11-07 03:47:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*","versionStartIncluding":"16.0","versionEndIncluding":"16.4.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0","versionEndIncluding":"17.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}