CVE-2024-12550

7.8 HIGH

📋 TL;DR

This vulnerability in Tungsten Automation Power PDF allows attackers to disclose sensitive information by tricking users into opening malicious JP2 files. The flaw exists in JP2 file parsing where improper data validation enables out-of-bounds reads. Affected users include anyone using vulnerable versions of Power PDF who opens untrusted JP2 files.

💻 Affected Systems

Products:
  • Tungsten Automation Power PDF
Versions: Specific versions not detailed in advisory, but all versions before patch are likely affected
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default JP2 file parsing functionality. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure combined with other vulnerabilities could lead to arbitrary code execution in the current process context, potentially compromising the entire system.

🟠

Likely Case

Sensitive information disclosure from memory, which could include credentials, documents, or system information.

🟢

If Mitigated

Limited impact with proper security controls, though information disclosure still possible.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but JP2 files could be delivered via web or email.
🏢 Internal Only: MEDIUM - Internal users could be targeted via malicious attachments or shared files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious JP2 file. Exploit likely requires additional vulnerabilities for code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.tungstenautomation.com/security

Restart Required: No

Instructions:

1. Check current Power PDF version. 2. Visit Tungsten Automation security advisory page. 3. Download and install latest security update. 4. Verify installation.

🔧 Temporary Workarounds

Disable JP2 file association

Windows

Remove JP2 file type association with Power PDF to prevent automatic opening

Control Panel > Default Programs > Associate a file type or protocol with a program > Select .jp2 > Change program > Choose different application

🧯 If You Can't Patch

  • Implement application whitelisting to block Power PDF execution
  • Use email/web filtering to block JP2 file attachments and downloads

🔍 How to Verify

Check if Vulnerable:

Check Power PDF version against vendor's patched version list

Check Version:

Open Power PDF > Help > About or check program properties

Verify Fix Applied:

Verify Power PDF version is updated to patched version and test with known safe JP2 files

📡 Detection & Monitoring

Log Indicators:

  • Power PDF crash logs
  • Unexpected memory access errors
  • JP2 file processing failures

Network Indicators:

  • JP2 file downloads from untrusted sources
  • Unusual outbound connections after JP2 file processing

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="PowerPDF.exe" AND FileExtension=".jp2"

🔗 References

📤 Share & Export