CVE-2023-26396

7.8 HIGH

📋 TL;DR

This vulnerability in Adobe Acrobat Reader allows attackers to create temporary files with incorrect permissions, potentially leading to privilege escalation. Users who open malicious PDF files are at risk. The vulnerability affects both the continuous track (DC) and classic track versions of Acrobat Reader.

💻 Affected Systems

Products:
  • Adobe Acrobat Reader DC
  • Adobe Acrobat Reader 2020
Versions: DC: 23.001.20093 and earlier, 2020: 20.005.30441 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. User interaction (opening malicious PDF) is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain elevated privileges on the system, potentially installing malware, accessing sensitive data, or taking full control of the affected machine.

🟠

Likely Case

Local privilege escalation allowing attackers to execute code with higher privileges than the current user context, potentially leading to persistence or lateral movement.

🟢

If Mitigated

With proper controls like least privilege accounts and application whitelisting, impact is limited to the current user's permissions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and knowledge of local file system. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: DC: 23.001.20143 or later, 2020: 20.005.30473 or later

Vendor Advisory: https://helpx.adobe.com/security/products/acrobat/apsb23-24.html

Restart Required: Yes

Instructions:

1. Open Adobe Acrobat Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to install latest version. 4. Restart computer after installation.

🔧 Temporary Workarounds

Disable JavaScript in Adobe Reader

all

Prevents malicious JavaScript from executing in PDF files

Edit > Preferences > JavaScript > Uncheck 'Enable Acrobat JavaScript'

Use Protected View

all

Open untrusted PDFs in Protected View mode

File > Open > Select 'Protected View' option

🧯 If You Can't Patch

  • Restrict user permissions to least privilege required
  • Implement application control to block execution of unauthorized programs

🔍 How to Verify

Check if Vulnerable:

Check Adobe Reader version in Help > About Adobe Acrobat Reader DC

Check Version:

Windows: "C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" /?, macOS: mdls -name kMDItemVersion /Applications/Adobe\ Acrobat\ Reader\ DC.app

Verify Fix Applied:

Verify version is 23.001.20143 or later for DC, or 20.005.30473 or later for 2020 version

📡 Detection & Monitoring

Log Indicators:

  • Unexpected temporary file creation in system directories
  • Adobe Reader process spawning child processes with elevated privileges

Network Indicators:

  • None - this is a local file system vulnerability

SIEM Query:

EventID=4688 AND ParentProcessName="AcroRd32.exe" AND NewProcessName contains "cmd.exe" OR "powershell.exe"

🔗 References

📤 Share & Export