CVE-2024-41835

5.5 MEDIUM

📋 TL;DR

This CVE describes an out-of-bounds read vulnerability in Adobe Acrobat Reader that could allow an attacker to read sensitive memory contents. When exploited, it could bypass security mitigations like ASLR, potentially leading to further exploitation. Users of affected Acrobat Reader versions who open malicious PDF files are at risk.

💻 Affected Systems

Products:
  • Adobe Acrobat Reader
Versions: 20.005.30636 and earlier, 24.002.20965 and earlier, 24.002.20964 and earlier, 24.001.30123 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. User interaction required (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Memory disclosure could lead to ASLR bypass, enabling reliable exploitation of additional vulnerabilities for arbitrary code execution or system compromise.

🟠

Likely Case

Information disclosure of memory contents, potentially revealing sensitive data or enabling further exploitation attempts.

🟢

If Mitigated

Limited impact with proper security controls; memory read only without direct code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious PDF). No public exploit code known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version via Adobe's security updates

Vendor Advisory: https://helpx.adobe.com/security/products/acrobat/apsb24-57.html

Restart Required: Yes

Instructions:

1. Open Adobe Acrobat Reader
2. Go to Help > Check for Updates
3. Follow prompts to install available updates
4. Restart the application

🔧 Temporary Workarounds

Disable JavaScript in PDFs

all

Prevents JavaScript-based exploitation vectors

Edit > Preferences > JavaScript > Uncheck 'Enable Acrobat JavaScript'

Use Protected View

all

Open untrusted PDFs in Protected View mode

File > Open > Select 'Protected View' option

🧯 If You Can't Patch

  • Restrict PDF file opening to trusted sources only
  • Use alternative PDF viewers for untrusted documents

🔍 How to Verify

Check if Vulnerable:

Check Help > About Adobe Acrobat Reader for version number and compare with affected versions

Check Version:

Help > About Adobe Acrobat Reader

Verify Fix Applied:

Verify version is updated beyond affected versions listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Acrobat crash logs with memory access violations
  • Unexpected PDF file openings from untrusted sources

Network Indicators:

  • Downloads of PDF files from suspicious sources

SIEM Query:

source="acrobat.exe" AND (event_type="crash" OR event_type="error")

🔗 References

📤 Share & Export