CVE-2020-9614

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass security features in Adobe Acrobat and Reader. It affects users running outdated versions of these PDF applications. Successful exploitation could allow attackers to circumvent security protections.

💻 Affected Systems

Products:
  • Adobe Acrobat DC
  • Adobe Acrobat Reader DC
  • Adobe Acrobat 2017
  • Adobe Acrobat Reader 2017
  • Adobe Acrobat 2015
  • Adobe Acrobat Reader 2015
Versions: Acrobat DC/Reader DC: 2020.006.20042 and earlier; Acrobat/Reader 2017: 2017.011.30166 and earlier; Acrobat/Reader 2015: 2015.006.30518 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability affects both continuous and classic track releases.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could bypass critical security features to execute malicious code or access restricted content without detection.

🟠

Likely Case

Attackers bypass security controls to open malicious PDFs or access protected content they shouldn't be able to view.

🟢

If Mitigated

With proper patching and security controls, the vulnerability is neutralized and security features function as intended.

🌐 Internet-Facing: MEDIUM - PDFs are commonly shared externally, but exploitation requires user interaction with malicious files.
🏢 Internal Only: MEDIUM - Internal users could be targeted with malicious PDFs via email or file shares.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious PDF). No public exploit code was available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Acrobat DC/Reader DC: 2020.009.20063 or later; Acrobat/Reader 2017: 2017.011.30173 or later; Acrobat/Reader 2015: 2015.006.30523 or later

Vendor Advisory: https://helpx.adobe.com/security/products/acrobat/apsb20-24.html

Restart Required: Yes

Instructions:

1. Open Adobe Acrobat or Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to install available updates. 4. Restart the application when prompted.

🔧 Temporary Workarounds

Disable JavaScript in Adobe Reader

all

Disabling JavaScript can prevent some exploitation vectors, though it may break legitimate PDF functionality.

Edit > Preferences > JavaScript > Uncheck 'Enable Acrobat JavaScript'

Use Protected View

all

Configure Adobe Reader to open all PDFs in Protected View mode to limit potential damage.

Edit > Preferences > Security (Enhanced) > Check 'Enable Protected View at startup' and 'Enable Enhanced Security'

🧯 If You Can't Patch

  • Restrict PDF file execution through application whitelisting or execution policies
  • Implement email filtering to block suspicious PDF attachments and sandbox PDF analysis

🔍 How to Verify

Check if Vulnerable:

Check Adobe Acrobat/Reader version: Help > About Adobe Acrobat/Reader. Compare version numbers against affected ranges.

Check Version:

On Windows: wmic product where "name like 'Adobe Acrobat%' or name like 'Adobe Reader%'" get version

Verify Fix Applied:

Verify version is updated to patched versions: Acrobat DC/Reader DC: 2020.009.20063+, Acrobat/Reader 2017: 2017.011.30173+, Acrobat/Reader 2015: 2015.006.30523+

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes of Acrobat/Reader
  • Security feature disablement events in application logs
  • Multiple failed attempts to access protected PDF content

Network Indicators:

  • Unusual outbound connections from Acrobat/Reader processes
  • Downloads of PDF files from suspicious sources

SIEM Query:

EventID=1 AND (Image LIKE '%AcroRd32.exe%' OR Image LIKE '%Acrobat.exe%') AND CommandLine LIKE '%.pdf%'

🔗 References

📤 Share & Export