CVE-2022-28236

7.8 HIGH

📋 TL;DR

This CVE describes an out-of-bounds write vulnerability in Adobe Acrobat Reader DC that could allow an attacker to execute arbitrary code on a victim's system. The vulnerability affects multiple versions across different release tracks and requires user interaction (opening a malicious PDF file) to exploit. Users of affected Acrobat Reader DC versions are at risk.

💻 Affected Systems

Products:
  • Adobe Acrobat Reader DC
Versions: 22.001.20085 and earlier, 20.005.3031x and earlier, 17.012.30205 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability affects multiple release tracks (continuous, classic, and 2017 tracks).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer in the context of the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malicious PDF files delivered via phishing emails or malicious websites lead to malware installation, credential theft, or system compromise when opened by users.

🟢

If Mitigated

With proper patching and security controls, the risk is limited to isolated incidents that can be contained through endpoint detection and user awareness training.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious PDF file). No public proof-of-concept has been disclosed as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.001.20085 (continuous track), 20.005.30314 (classic track), 17.012.30206 (2017 track)

Vendor Advisory: https://helpx.adobe.com/security/products/acrobat/apsb22-16.html

Restart Required: Yes

Instructions:

1. Open Adobe Acrobat Reader DC. 2. Go to Help > Check for Updates. 3. Follow the prompts to download and install the latest version. 4. Restart the application when prompted.

🔧 Temporary Workarounds

Disable JavaScript in Adobe Reader

all

Disabling JavaScript can prevent exploitation of many PDF-based vulnerabilities

Edit > Preferences > JavaScript > Uncheck 'Enable Acrobat JavaScript'

Use Protected View

all

Enable Protected View for files from potentially unsafe locations

Edit > Preferences > Security (Enhanced) > Enable Protected View for files originating from the Internet

🧯 If You Can't Patch

  • Implement application whitelisting to block execution of unauthorized PDF files
  • Deploy endpoint detection and response (EDR) solutions to detect malicious PDF behavior

🔍 How to Verify

Check if Vulnerable:

Check Help > About Adobe Acrobat Reader DC and compare version against affected ranges

Check Version:

On Windows: wmic product where name="Adobe Acrobat Reader DC" get version

Verify Fix Applied:

Verify version is 22.001.20085 or higher (continuous), 20.005.30314 or higher (classic), or 17.012.30206 or higher (2017)

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation from AcroRd32.exe
  • Memory access violations in application logs
  • PDF file opening events followed by suspicious network connections

Network Indicators:

  • Outbound connections from Acrobat Reader to unknown IPs
  • DNS requests for suspicious domains following PDF opening

SIEM Query:

process_name:"AcroRd32.exe" AND (event_type:"process_creation" OR event_type:"network_connection")

🔗 References

📤 Share & Export