CVE-2024-39425

7.0 HIGH

📋 TL;DR

This CVE describes a Time-of-check Time-of-use (TOCTOU) race condition vulnerability in Adobe Acrobat Reader that could allow local attackers to escalate privileges. The vulnerability affects users running specific versions of Acrobat Reader on Windows systems. Exploitation requires local low-privilege access and has high attack complexity.

💻 Affected Systems

Products:
  • Adobe Acrobat Reader DC
  • Adobe Acrobat Reader
Versions: Versions 20.005.30636 and earlier, 24.002.20965 and earlier, 24.002.20964 and earlier, 24.001.30123 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of Adobe Acrobat Reader. Requires local low-privilege access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local low-privilege access could exploit this race condition to execute arbitrary code with SYSTEM/administrator privileges, potentially gaining full control of the affected system.

🟠

Likely Case

In most real-world scenarios, this would allow a malicious user or malware already present on the system to elevate privileges from standard user to administrator, enabling persistence, lateral movement, or disabling security controls.

🟢

If Mitigated

With proper controls like least privilege access, application whitelisting, and regular patching, the impact is limited as attackers would need to bypass multiple security layers to exploit this local vulnerability.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability that requires an attacker to already have local access to the system. It cannot be exploited remotely over the internet.
🏢 Internal Only: MEDIUM - While exploitation requires local access, internal threats (malicious insiders, compromised accounts, or malware) could leverage this vulnerability to escalate privileges within an organization's network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires local access and precise timing to win the race condition. No public proof-of-concept has been disclosed as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 20.005.30637 or later for Acrobat Reader DC, or version 24.002.20966 or later for Acrobat Reader

Vendor Advisory: https://helpx.adobe.com/security/products/acrobat/apsb24-57.html

Restart Required: Yes

Instructions:

1. Open Adobe Acrobat Reader. 2. Navigate to Help > Check for Updates. 3. Follow the prompts to download and install the latest version. 4. Restart the application and system if prompted.

🔧 Temporary Workarounds

Disable Adobe Acrobat Reader automatic updates

windows

Prevents potential exploitation through update mechanisms while waiting for patch deployment

reg add "HKLM\SOFTWARE\Policies\Adobe\Acrobat Reader\DC\FeatureLockDown" /v bUpdater /t REG_DWORD /d 0 /f

Restrict execution to trusted users

windows

Limit Acrobat Reader execution to only necessary users through group policy or application control

🧯 If You Can't Patch

  • Implement least privilege access controls to limit users who can run Acrobat Reader
  • Deploy application whitelisting to prevent unauthorized execution or modification of Acrobat Reader binaries

🔍 How to Verify

Check if Vulnerable:

Check Adobe Acrobat Reader version by opening the application and navigating to Help > About Adobe Acrobat Reader DC

Check Version:

wmic product where "name like 'Adobe Acrobat Reader%'" get version

Verify Fix Applied:

Verify the version number is 20.005.30637 or higher for Acrobat Reader DC, or 24.002.20966 or higher for Acrobat Reader

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Acrobat Reader binaries
  • Multiple rapid file access attempts to Acrobat Reader directories
  • Privilege escalation events following Acrobat Reader execution

Network Indicators:

  • No network indicators as this is a local privilege escalation vulnerability

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%AcroRd32.exe%' OR ProcessName LIKE '%Acrobat.exe%') AND NewProcessName LIKE '%cmd.exe%' OR NewProcessName LIKE '%powershell.exe%'

🔗 References

📤 Share & Export