US cybersecurity agency warns of actively exploited Adobe Acrobat Reader vulnerability

The US Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a high-severity flaw in Adobe ....

by Vikash Kumawat
0 comments 213 views 1 minutes read

The US Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a high-severity flaw in Adobe Acrobat Reader to its Known Exploitable Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

Tracked as CVE-2023-21608 (CVSS score: 7.8), the vulnerability is described as a use-after-free bug that can be exploited to achieve remote code execution (RCE) with the privileges of the current user.

A patch for the flaw was released by Adobe in January 2023. HackSys security researchers Ashfaq Ansari and Krishnakant Patil were credited with discovering and reporting the flaw.

The following versions of software are affected –

  • Acrobat DC – 22.003.20282 (Win), 22.003.20281 (Mac) and earlier versions (fixed in 22.003.20310)
  • Acrobat Reader DC – 22.003.20282 (Win), 22.003.20281 (Mac) and earlier versions (fixed in 22.003.20310)
  • Acrobat 2020 – 20.005.30418 and earlier versions (fixed in 20.005.30436)
  • Acrobat Reader 2020 – 20.005.30418 and earlier versions (fixed in 20.005.30436)

Details regarding the nature of the exploit and the threat actors that exploits CVE-2023-21608 are currently unknown. A proof-of-concept (POC) exploit for the flaw was made available in late January 2023.

CVE-2023-21608 is also the second Adobe Acrobat and Reader vulnerability that has seen in-the-wild exploitation after CVE-2023-26369, an out-of-bounds write issue that could result in code execution by opening a specially crafted PDF document.

Federal Civilian Executive Branch (FCEB) agencies are required to apply vendor-provided patches by October 31, 2023, to secure their networks against potential threats.

You may also like

Leave a Comment

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

-
00:00
00:00
Update Required Flash plugin
-
00:00
00:00