⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: The impacted product is end-of-life and should be disconnected if still in use.. Due date: 2022-05-03.
CVE-2018-4878 — Use After Free in Adobe Flash Player
Severity
7.8HIGHNVD
EPSS
93.5%
top 0.17%
CISA KEV
KEVRansomware
Added 2021-11-03
Due 2022-05-03
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedFeb 6
KEV addedNov 3
KEV dueMay 3
Latest updateFeb 12
CISA Required Action: The impacted product is end-of-life and should be disconnected if still in use.
Description
A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages4 packages
🔴Vulnerability Details
4GHSA▶
GHSA-2rf4-mpg3-phjw: A use-after-free vulnerability was discovered in Adobe Flash Player before 28↗2022-05-13
CVEList▶
CVE-2018-4878: A use-after-free vulnerability was discovered in Adobe Flash Player before 28↗2018-02-06
OSV▶
CVE-2018-4878: A use-after-free vulnerability was discovered in Adobe Flash Player before 28↗2018-02-06
💥Exploits & PoCs
3🔍Detection Rules
2📋Vendor Advisories
2🕵️Threat Intelligence
54Sentinelone
▶
📄Research Papers
2💬Community
1Bugzilla▶
CVE-2018-4877 CVE-2018-4878 flash-plugin: use-after-free causing remote code execution (APSB18-03)↗2018-02-05