CVE-2024-30310
📋 TL;DR
This CVE describes an out-of-bounds write vulnerability in Adobe Acrobat Reader that could allow arbitrary code execution when a user opens a malicious PDF file. Attackers could gain control of the affected system with the same privileges as the current user. All users running vulnerable versions of Acrobat Reader are affected.
💻 Affected Systems
- Adobe Acrobat Reader DC
- Adobe Acrobat Reader
📦 What is this software?
Acrobat by Adobe
Acrobat by Adobe
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the victim's computer, potentially leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Malicious actors deliver weaponized PDFs via phishing campaigns, resulting in malware installation, credential theft, or initial network access for further attacks.
If Mitigated
With proper security controls, the impact is limited to isolated incidents affecting individual workstations, with minimal data loss and no lateral movement.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious file). Attack complexity is low once malicious file is delivered.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 20.005.30575 and 24.002.20737
Vendor Advisory: https://helpx.adobe.com/security/products/acrobat/apsb24-29.html
Restart Required: Yes
Instructions:
1. Open Adobe Acrobat Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to install available updates. 4. Restart the application when prompted.
🔧 Temporary Workarounds
Disable JavaScript in Adobe Reader
allPrevents JavaScript-based exploitation vectors that might be used in conjunction with this vulnerability
Edit > Preferences > JavaScript > Uncheck 'Enable Acrobat JavaScript'
Use Protected View
allForce all PDFs to open in Protected View mode to limit potential damage
Edit > Preferences > Security (Enhanced) > Check 'Enable Protected View at startup'
🧯 If You Can't Patch
- Implement application whitelisting to block unauthorized PDF readers
- Deploy email filtering to block malicious PDF attachments
🔍 How to Verify
Check if Vulnerable:
Check Adobe Acrobat Reader version in Help > About Adobe Acrobat Reader DC
Check Version:
On Windows: "C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" /?
Verify Fix Applied:
Verify version is 20.005.30575 or higher for continuous track, or 24.002.20737 or higher for classic track
📡 Detection & Monitoring
Log Indicators:
- Adobe Reader crash logs with memory access violations
- Windows Event Logs showing unexpected process creation from AcroRd32.exe
Network Indicators:
- Unusual outbound connections from Adobe Reader process
- DNS requests to suspicious domains following PDF opening
SIEM Query:
source="*acrobat*" AND (event_id=1000 OR event_id=1001) AND message="*Access Violation*"