CVE-2024-34098

7.8 HIGH

📋 TL;DR

This CVE describes an Improper Input Validation vulnerability in Adobe Acrobat Reader that could allow arbitrary code execution when a user opens a malicious PDF file. The vulnerability affects multiple versions of Acrobat Reader across different release tracks. Successful exploitation requires user interaction through opening a malicious document.

💻 Affected Systems

Products:
  • Adobe Acrobat Reader DC
  • Adobe Acrobat Reader
Versions: 20.005.30574 and earlier (Continuous Track), 24.002.20736 and earlier (Classic Track)
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The vulnerability affects both Continuous and Classic release tracks of Acrobat Reader.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer in the context of the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malicious actors sending phishing emails with weaponized PDF attachments that execute malware when opened, leading to credential theft, data exfiltration, or installation of persistent backdoors.

🟢

If Mitigated

With proper security controls like application whitelisting, least privilege accounts, and email filtering, the impact is limited to isolated incidents that can be contained through endpoint detection and response.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious file). No public proof-of-concept has been released as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.005.30575 (Continuous Track), 24.002.20737 (Classic Track)

Vendor Advisory: https://helpx.adobe.com/security/products/acrobat/apsb24-29.html

Restart Required: Yes

Instructions:

1. Open Adobe Acrobat Reader. 2. Navigate to Help > Check for Updates. 3. Follow prompts to install available updates. 4. Restart the application when prompted. Alternatively, download the latest version from Adobe's website.

🔧 Temporary Workarounds

Disable JavaScript in Adobe Reader

all

Disabling JavaScript can prevent exploitation of many PDF-based vulnerabilities

Edit > Preferences > JavaScript > Uncheck 'Enable Acrobat JavaScript'

Use Protected View

all

Configure Adobe Reader to open files from untrusted sources in Protected View

Edit > Preferences > Security (Enhanced) > Enable Protected View for files from potentially unsafe locations

🧯 If You Can't Patch

  • Implement application control/whitelisting to block unauthorized PDF readers
  • Use email filtering to block PDF attachments from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check Adobe Acrobat Reader version via Help > About Adobe Acrobat Reader DC

Check Version:

On Windows: wmic product where name="Adobe Acrobat Reader DC" get version

Verify Fix Applied:

Verify version is 20.005.30575 or higher (Continuous Track) or 24.002.20737 or higher (Classic Track)

📡 Detection & Monitoring

Log Indicators:

  • Adobe Reader crash logs with suspicious memory addresses
  • Windows Event Logs showing unexpected process creation from AcroRd32.exe

Network Indicators:

  • Outbound connections from Adobe Reader process to suspicious IPs
  • DNS requests for known malicious domains following PDF file opening

SIEM Query:

source="*acrobat*" OR process="AcroRd32.exe" AND (event_type="crash" OR parent_process!="explorer.exe")

🔗 References

📤 Share & Export