CVE-2024-12547

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JPF files in Tungsten Automation Power PDF. The flaw exists in JPF file parsing where improper data validation enables out-of-bounds writes. All users of affected Power PDF versions are at risk.

💻 Affected Systems

Products:
  • Tungsten Automation Power PDF
Versions: Specific versions not detailed in advisory - check vendor documentation
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations that process JPF files are vulnerable. User interaction required (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the PDF application user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Malicious actors send phishing emails with crafted JPF files, leading to code execution on individual workstations when users open the files.

🟢

If Mitigated

With proper security controls, exploitation attempts are blocked at email gateways or endpoints, and limited user privileges prevent system-wide compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The vulnerability is memory corruption-based requiring specific file crafting.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tungsten Automation security advisory for specific patched version

Vendor Advisory: https://www.tungstenautomation.com/security

Restart Required: No

Instructions:

1. Check current Power PDF version
2. Visit Tungsten Automation security portal
3. Download and apply latest security update
4. Verify update installation

🔧 Temporary Workarounds

Disable JPF file association

Windows

Remove JPF file type association with Power PDF to prevent automatic opening

Control Panel > Default Programs > Associate a file type or protocol with a program > Remove .jpf association with Power PDF

Block JPF files at perimeter

all

Configure email and web gateways to block JPF file attachments

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized Power PDF execution
  • Restrict user privileges to standard user accounts (not administrator)

🔍 How to Verify

Check if Vulnerable:

Check Power PDF version against vendor's security advisory for affected versions

Check Version:

Open Power PDF > Help > About Power PDF

Verify Fix Applied:

Verify Power PDF version matches or exceeds patched version specified in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Power PDF crash logs with memory access violations
  • Windows Application logs showing Power PDF process termination

Network Indicators:

  • Inbound emails with JPF attachments from unknown sources
  • Downloads of JPF files from untrusted websites

SIEM Query:

Process:PowerPDF.exe AND (EventID:1000 OR EventID:1001) AND ExceptionCode:c0000005

🔗 References

📤 Share & Export