CVE-2023-38091
📋 TL;DR
This vulnerability in Kofax Power PDF allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visiting malicious web pages. The flaw exists in the app.response method implementation where improper data validation leads to type confusion. All users running affected versions of Kofax Power PDF are at risk.
💻 Affected Systems
- Kofax Power PDF
📦 What is this software?
Power Pdf by Tungstenautomation
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the affected system, data theft, ransomware deployment, and lateral movement within the network.
Likely Case
Malware installation leading to data exfiltration, credential theft, or system disruption for individual users who open malicious PDFs.
If Mitigated
Limited impact with only isolated user account compromise if proper application sandboxing and least privilege principles are implemented.
🎯 Exploit Status
Exploitation requires user interaction but no authentication. The vulnerability was discovered by Zero Day Initiative (ZDI-CAN-20601).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Kofax security advisory for specific patched version
Vendor Advisory: https://www.kofax.com/security-advisories
Restart Required: Yes
Instructions:
1. Visit Kofax security advisory page
2. Download latest version of Power PDF
3. Install update
4. Restart system
🔧 Temporary Workarounds
Disable JavaScript in PDF Reader
windowsPrevents exploitation by disabling JavaScript execution in PDF files
In Power PDF: File > Preferences > JavaScript > Uncheck 'Enable JavaScript'
Use Alternative PDF Reader
windowsTemporarily use a different PDF reader that is not affected
🧯 If You Can't Patch
- Implement application whitelisting to block unauthorized PDF readers
- Deploy network segmentation to isolate PDF processing systems
- Enforce strict email filtering for PDF attachments
- Implement user awareness training about opening suspicious PDFs
🔍 How to Verify
Check if Vulnerable:
Check Power PDF version against Kofax security advisory for affected versions
Check Version:
In Power PDF: Help > About Power PDF
Verify Fix Applied:
Verify Power PDF version is updated to patched version specified in Kofax advisory
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from Power PDF executable
- Power PDF crashes with memory access violations
- Network connections initiated by Power PDF process
Network Indicators:
- Outbound connections from Power PDF to suspicious domains
- Unusual download patterns following PDF file access
SIEM Query:
Process Creation where ParentImage contains 'PowerPDF' AND (CommandLine contains 'powershell' OR CommandLine contains 'cmd' OR CommandLine contains 'wscript')