CVE-2024-12549
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JP2 files in Tungsten Automation Power PDF. The flaw exists in JP2 file parsing where improper data validation leads to out-of-bounds reads. Affected users include anyone running vulnerable versions of Power PDF who opens untrusted JP2 files.
💻 Affected Systems
- Tungsten Automation Power PDF
📦 What is this software?
Power Pdf by Tungstenautomation
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining the same privileges as the PDF application user, potentially leading to data theft, ransomware deployment, or lateral movement.
Likely Case
Local privilege escalation or application crash leading to denial of service, with potential for code execution in the PDF application context.
If Mitigated
Application crash without code execution if exploit fails or security controls block malicious payloads.
🎯 Exploit Status
Exploitation requires user to open malicious JP2 file. No authentication bypass needed once file is opened.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Tungsten Automation security advisory for specific patched version
Vendor Advisory: https://www.tungstenautomation.com/security
Restart Required: No
Instructions:
1. Check current Power PDF version. 2. Visit Tungsten Automation security portal. 3. Download and apply latest security update. 4. Verify patch installation.
🔧 Temporary Workarounds
Disable JP2 file association
WindowsRemove JP2 file type association with Power PDF to prevent automatic opening
Control Panel > Default Programs > Associate a file type or protocol with a program > Remove .jp2 association with Power PDF
Block JP2 files at perimeter
allConfigure email/web gateways to block JP2 file attachments and downloads
🧯 If You Can't Patch
- Implement application whitelisting to prevent unauthorized code execution
- Run Power PDF with reduced privileges using application sandboxing or restricted user accounts
🔍 How to Verify
Check if Vulnerable:
Check Power PDF version against Tungsten Automation security advisory. Versions before the patched release are vulnerable.
Check Version:
Open Power PDF > Help > About Power PDF
Verify Fix Applied:
Verify Power PDF version matches or exceeds patched version listed in vendor advisory.
📡 Detection & Monitoring
Log Indicators:
- Application crashes with memory access violations
- Unexpected child processes spawned from pdf processes
- Unusual file access patterns for JP2 files
Network Indicators:
- Downloads of JP2 files from untrusted sources
- Outbound connections from PDF application to unknown IPs
SIEM Query:
process_name:"PowerPDF.exe" AND (event_id:1000 OR event_id:1001) OR file_extension:".jp2" AND process_name:"PowerPDF.exe"