CVE-2020-24428
📋 TL;DR
This CVE describes a time-of-check time-of-use (TOCTOU) race condition vulnerability in Adobe Acrobat Reader DC for macOS that allows local privilege escalation. An attacker could exploit this by tricking a user into opening a malicious file, potentially gaining elevated privileges on the affected system. Only macOS users running vulnerable versions of Acrobat Reader DC are affected.
💻 Affected Systems
- Adobe Acrobat Reader DC
📦 What is this software?
Acrobat by Adobe
⚠️ Risk & Real-World Impact
Worst Case
An attacker gains root privileges on the macOS system, allowing complete system compromise, data theft, persistence installation, and lateral movement.
Likely Case
Local privilege escalation to gain administrative rights on the affected macOS machine, enabling further malicious activities.
If Mitigated
No impact if proper patching is applied or if users avoid opening untrusted PDF files.
🎯 Exploit Status
Exploitation requires local access and user interaction to open a malicious file. Race condition vulnerabilities can be challenging to exploit reliably.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2020.012.20049, 2020.001.30006, 2017.011.30176 or later
Vendor Advisory: https://helpx.adobe.com/security/products/acrobat/apsb20-67.html
Restart Required: Yes
Instructions:
1. Open Adobe Acrobat Reader DC. 2. Go to Help > Check for Updates. 3. Follow prompts to install available updates. 4. Restart the application.
🔧 Temporary Workarounds
Disable automatic PDF opening
macOSConfigure macOS to not automatically open PDF files with Acrobat Reader DC
Use alternative PDF reader
macOSTemporarily use macOS Preview or other PDF readers until patched
🧯 If You Can't Patch
- Restrict user permissions to prevent privilege escalation impact
- Implement application whitelisting to block Acrobat Reader DC execution
🔍 How to Verify
Check if Vulnerable:
Check Acrobat Reader DC version via Help > About Adobe Acrobat Reader DC
Check Version:
defaults read /Applications/Adobe\ Acrobat\ Reader\ DC.app/Contents/Info.plist CFBundleShortVersionString
Verify Fix Applied:
Verify version is 2020.012.20049, 2020.001.30006, 2017.011.30176 or later
📡 Detection & Monitoring
Log Indicators:
- Unusual privilege escalation events in macOS system logs
- Acrobat Reader DC crash reports with suspicious file paths
Network Indicators:
- None - this is a local privilege escalation vulnerability
SIEM Query:
source="macOS_system_logs" AND (event="privilege_escalation" OR process="AcroRd32")