CVE-2020-3763

9.8 CRITICAL

📋 TL;DR

CVE-2020-3763 is a critical privilege escalation vulnerability in Adobe Acrobat and Reader that allows attackers to write arbitrary files to the system. This affects users running outdated versions of Adobe Acrobat and Reader across multiple release tracks. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Adobe Acrobat DC
  • Adobe Acrobat Reader DC
  • Adobe Acrobat 2017
  • Adobe Acrobat Reader 2017
  • Adobe Acrobat 2015
  • Adobe Acrobat Reader 2015
Versions: Acrobat DC/Reader DC: 2019.021.20061 and earlier; Acrobat 2017/Reader 2017: 2017.011.30156 and earlier; Acrobat 2015/Reader 2015: 2015.006.30508 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the core PDF processing components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing installation of persistent malware, data theft, and lateral movement across networks.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or ransomware deployment on affected systems.

🟢

If Mitigated

Limited impact with proper application sandboxing, least privilege principles, and network segmentation in place.

🌐 Internet-Facing: MEDIUM - While primarily a local privilege escalation, it could be combined with other vulnerabilities for remote exploitation.
🏢 Internal Only: HIGH - Significant risk for internal workstations where users have local access and run vulnerable PDF software.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to the system. The vulnerability allows writing arbitrary files, which can be leveraged for privilege escalation through various techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Acrobat DC/Reader DC: 2020.001.20035 or later; Acrobat 2017/Reader 2017: 2020.001.20035 or later; Acrobat 2015/Reader 2015: 2020.001.20035 or later

Vendor Advisory: https://helpx.adobe.com/security/products/acrobat/apsb20-05.html

Restart Required: Yes

Instructions:

1. Open Adobe Acrobat or Reader. 2. Navigate to Help > Check for Updates. 3. Follow the prompts to download and install the latest version. 4. Restart the application and system if prompted.

🔧 Temporary Workarounds

Disable PDF file associations

windows

Prevent Adobe Acrobat/Reader from automatically opening PDF files

Windows: Control Panel > Default Programs > Set Associations > Find .pdf > Change program to another application

Apply least privilege

all

Run Adobe Acrobat/Reader with standard user privileges instead of administrative rights

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized executables from running
  • Deploy endpoint detection and response (EDR) solutions to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Adobe Acrobat/Reader version: Open application > Help > About Adobe Acrobat/Reader. Compare version against affected ranges.

Check Version:

Windows: wmic product where "name like 'Adobe Acrobat%' or name like 'Adobe Reader%'" get version

Verify Fix Applied:

Verify version is 2020.001.20035 or later in Help > About Adobe Acrobat/Reader.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Security logs showing privilege escalation attempts
  • Application logs showing unexpected file write operations by Acrobat/Reader processes

Network Indicators:

  • Unusual outbound connections from Acrobat/Reader processes
  • DNS requests to suspicious domains from PDF-related processes

SIEM Query:

process_name:"AcroRd32.exe" OR process_name:"Acrobat.exe" AND (event_type:"file_write" OR event_type:"privilege_escalation")

🔗 References

📤 Share & Export