CVE-2024-12549

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JP2 files in Tungsten Automation Power PDF. The flaw exists in JP2 file parsing where improper data validation leads to out-of-bounds reads. Affected users include anyone running vulnerable versions of Power PDF who opens untrusted JP2 files.

💻 Affected Systems

Products:
  • Tungsten Automation Power PDF
Versions: Specific versions not detailed in advisory, but likely multiple recent versions prior to patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with JP2 file support enabled are vulnerable. User interaction required (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the PDF application user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or application crash leading to denial of service, with potential for code execution in the PDF application context.

🟢

If Mitigated

Application crash without code execution if exploit fails or security controls block malicious payloads.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user to open malicious JP2 file. No authentication bypass needed once file is opened.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tungsten Automation security advisory for specific patched version

Vendor Advisory: https://www.tungstenautomation.com/security

Restart Required: No

Instructions:

1. Check current Power PDF version. 2. Visit Tungsten Automation security portal. 3. Download and apply latest security update. 4. Verify patch installation.

🔧 Temporary Workarounds

Disable JP2 file association

Windows

Remove JP2 file type association with Power PDF to prevent automatic opening

Control Panel > Default Programs > Associate a file type or protocol with a program > Remove .jp2 association with Power PDF

Block JP2 files at perimeter

all

Configure email/web gateways to block JP2 file attachments and downloads

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized code execution
  • Run Power PDF with reduced privileges using application sandboxing or restricted user accounts

🔍 How to Verify

Check if Vulnerable:

Check Power PDF version against Tungsten Automation security advisory. Versions before the patched release are vulnerable.

Check Version:

Open Power PDF > Help > About Power PDF

Verify Fix Applied:

Verify Power PDF version matches or exceeds patched version listed in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected child processes spawned from pdf processes
  • Unusual file access patterns for JP2 files

Network Indicators:

  • Downloads of JP2 files from untrusted sources
  • Outbound connections from PDF application to unknown IPs

SIEM Query:

process_name:"PowerPDF.exe" AND (event_id:1000 OR event_id:1001) OR file_extension:".jp2" AND process_name:"PowerPDF.exe"

🔗 References

📤 Share & Export