CVE-2023-37343

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JP2 image files in Kofax Power PDF. Attackers can exploit improper bounds checking during JP2 file parsing to write beyond allocated memory boundaries and gain code execution. All users of affected Kofax Power PDF versions are vulnerable.

💻 Affected Systems

Products:
  • Kofax Power PDF
Versions: Versions prior to the patched release (specific version numbers not provided in available references)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability requires user interaction to open a malicious JP2 file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the PDF viewer process, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to user account compromise, data exfiltration, or installation of persistent malware on the affected system.

🟢

If Mitigated

Limited impact with proper application sandboxing and privilege separation, potentially resulting in application crash but no code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once a malicious JP2 file is crafted. The vulnerability was discovered by Zero Day Initiative (ZDI-CAN-20440).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Kofax security advisory for specific patched version

Vendor Advisory: https://docshield.kofax.com/PowerPDF/en_US/5.5.0-d3ps28gq9d/print/ReadMe.htm

Restart Required: Yes

Instructions:

1. Check current Power PDF version. 2. Download and install the latest update from Kofax official website. 3. Restart the system to ensure patch is fully applied.

🔧 Temporary Workarounds

Disable JP2 file association

windows

Remove Power PDF as the default handler for JP2 files to prevent automatic opening

Control Panel > Default Programs > Set Associations > Find .jp2 > Change to another program or 'Look for an app in the Store'

Application control policy

windows

Block Power PDF from opening JP2 files using Group Policy or endpoint protection

🧯 If You Can't Patch

  • Implement application sandboxing to limit potential damage from code execution
  • Use network segmentation to isolate systems running vulnerable software from critical assets

🔍 How to Verify

Check if Vulnerable:

Check Power PDF version against Kofax security advisory. Versions prior to the patched release are vulnerable.

Check Version:

Open Power PDF > Help > About Power PDF

Verify Fix Applied:

Verify Power PDF version matches or exceeds the patched version listed in Kofax advisory

📡 Detection & Monitoring

Log Indicators:

  • Power PDF crash logs with memory access violations
  • Unexpected child processes spawned from Power PDF

Network Indicators:

  • Outbound connections from Power PDF process to unknown IPs
  • Unusual network traffic patterns following PDF file opening

SIEM Query:

process_name:"PowerPDF.exe" AND (event_id:1000 OR event_id:1001) AND exception_code:(0xc0000005 OR 0xc0000409)

🔗 References

📤 Share & Export