CVE-2023-38091

7.8 HIGH

📋 TL;DR

This vulnerability in Kofax Power PDF allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visiting malicious web pages. The flaw exists in the app.response method implementation where improper data validation leads to type confusion. All users running affected versions of Kofax Power PDF are at risk.

💻 Affected Systems

Products:
  • Kofax Power PDF
Versions: Specific versions not detailed in provided references, but likely multiple versions prior to patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. User interaction required (opening malicious PDF or visiting malicious page).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, data theft, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Malware installation leading to data exfiltration, credential theft, or system disruption for individual users who open malicious PDFs.

🟢

If Mitigated

Limited impact with only isolated user account compromise if proper application sandboxing and least privilege principles are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction but no authentication. The vulnerability was discovered by Zero Day Initiative (ZDI-CAN-20601).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Kofax security advisory for specific patched version

Vendor Advisory: https://www.kofax.com/security-advisories

Restart Required: Yes

Instructions:

1. Visit Kofax security advisory page
2. Download latest version of Power PDF
3. Install update
4. Restart system

🔧 Temporary Workarounds

Disable JavaScript in PDF Reader

windows

Prevents exploitation by disabling JavaScript execution in PDF files

In Power PDF: File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use Alternative PDF Reader

windows

Temporarily use a different PDF reader that is not affected

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized PDF readers
  • Deploy network segmentation to isolate PDF processing systems
  • Enforce strict email filtering for PDF attachments
  • Implement user awareness training about opening suspicious PDFs

🔍 How to Verify

Check if Vulnerable:

Check Power PDF version against Kofax security advisory for affected versions

Check Version:

In Power PDF: Help > About Power PDF

Verify Fix Applied:

Verify Power PDF version is updated to patched version specified in Kofax advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Power PDF executable
  • Power PDF crashes with memory access violations
  • Network connections initiated by Power PDF process

Network Indicators:

  • Outbound connections from Power PDF to suspicious domains
  • Unusual download patterns following PDF file access

SIEM Query:

Process Creation where ParentImage contains 'PowerPDF' AND (CommandLine contains 'powershell' OR CommandLine contains 'cmd' OR CommandLine contains 'wscript')

🔗 References

📤 Share & Export