CVE-2022-35672

7.8 HIGH

📋 TL;DR

This vulnerability in Adobe Acrobat Reader allows an attacker to execute arbitrary code on a victim's system by tricking them into opening a malicious PDF file. It affects users of Adobe Acrobat Reader across multiple versions on various operating systems. Exploitation requires user interaction, such as opening a crafted file.

💻 Affected Systems

Products:
  • Adobe Acrobat Reader
Versions: 22.001.20085 and earlier, 20.005.30314 and earlier, 17.012.30205 and earlier
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable; no special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or further network infiltration.

🟠

Likely Case

Local code execution in the context of the user, enabling malware installation, credential harvesting, or lateral movement within the environment.

🟢

If Mitigated

Limited impact if user awareness is high and file restrictions are in place, possibly resulting in application crash or denial of service without code execution.

🌐 Internet-Facing: MEDIUM, as exploitation requires user interaction via malicious files often delivered through email or web downloads, but widespread phishing campaigns could increase risk.
🏢 Internal Only: MEDIUM, due to reliance on user interaction; risk is lower if internal users are trained and file sharing is controlled, but still present via internal phishing or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious file; no public proof-of-concept has been disclosed as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 22.001.20085 or later for 22.x, 20.005.30314 or later for 20.x, or 17.012.30205 or later for 17.x, as specified in the vendor advisory.

Vendor Advisory: https://helpx.adobe.com/security/products/acrobat/apsb22-16.html

Restart Required: Yes

Instructions:

1. Open Adobe Acrobat Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to download and install the latest version. 4. Restart the application and system if required.

🔧 Temporary Workarounds

Disable JavaScript in Adobe Reader

all

Reduces attack surface by disabling JavaScript, which may be used in exploitation chains, though not directly required for this CVE.

In Adobe Reader, go to Edit > Preferences > JavaScript, then uncheck 'Enable JavaScript'.

Use Application Whitelisting

windows

Restrict execution of Adobe Reader to trusted locations or block it entirely if not needed, preventing malicious file execution.

Configure via Group Policy or endpoint security tools to whitelist only approved applications.

🧯 If You Can't Patch

  • Implement strict email filtering and user training to block suspicious PDF attachments and educate users on not opening untrusted files.
  • Use endpoint detection and response (EDR) tools to monitor for unusual process execution or file access related to Adobe Reader.

🔍 How to Verify

Check if Vulnerable:

Check the Adobe Reader version by opening the application and navigating to Help > About Adobe Acrobat Reader DC, then compare with affected versions listed in the advisory.

Check Version:

On Windows, run: "C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" /? or check via Help > About; on macOS/Linux, use the application's about dialog.

Verify Fix Applied:

After updating, verify the version is at or above the patched versions: 22.001.20085, 20.005.30314, or 17.012.30205, depending on the branch.

📡 Detection & Monitoring

Log Indicators:

  • Look for application crashes or errors in system logs related to Adobe Reader processes (e.g., AcroRd32.exe on Windows).
  • Monitor for unusual file access or execution events from Adobe Reader in security logs.

Network Indicators:

  • Detect downloads of PDF files from untrusted sources or unusual outbound connections post-file opening.

SIEM Query:

Example: source="*security*" AND process="AcroRd32.exe" AND (event_id="1000" OR event_id="1001") for crash detection on Windows.

🔗 References

📤 Share & Export