CVE-2024-45112

7.8 HIGH

📋 TL;DR

This CVE describes a Type Confusion vulnerability in Adobe Acrobat Reader that could allow arbitrary code execution when a user opens a malicious PDF file. Attackers can exploit this by tricking users into opening specially crafted documents, potentially gaining control of the affected system. Users of Adobe Acrobat Reader versions 24.002.21005, 24.001.30159, 20.005.30655, 24.003.20054 and earlier are affected.

💻 Affected Systems

Products:
  • Adobe Acrobat Reader DC
  • Adobe Acrobat Reader
Versions: 24.002.21005, 24.001.30159, 20.005.30655, 24.003.20054 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Requires user interaction to open malicious PDF file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer, allowing data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malicious actor gains user-level access to the system, enabling data exfiltration, credential theft, and installation of additional malware.

🟢

If Mitigated

Limited impact due to application sandboxing, but potential for privilege escalation or bypass of security controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). Type confusion vulnerabilities typically require sophisticated exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 24.003.20054 or later for continuous track, or 20.005.30655 or later for classic track

Vendor Advisory: https://helpx.adobe.com/security/products/acrobat/apsb24-70.html

Restart Required: Yes

Instructions:

1. Open Adobe Acrobat Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to download and install available updates. 4. Restart the application when prompted.

🔧 Temporary Workarounds

Disable JavaScript in Adobe Reader

all

Prevents JavaScript-based exploitation vectors that might be used in conjunction with this vulnerability

Edit > Preferences > JavaScript > Uncheck 'Enable Acrobat JavaScript'

Use Protected View

all

Open PDFs in Protected View mode to limit potential damage

File > Open > Select 'Open in Protected View' or enable in Preferences > Security (Enhanced)

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized PDF files
  • Use network segmentation to isolate PDF processing systems and limit lateral movement

🔍 How to Verify

Check if Vulnerable:

Check Adobe Acrobat Reader version via Help > About Adobe Acrobat Reader DC

Check Version:

On Windows: wmic product where "name like 'Adobe Acrobat Reader%'" get version

Verify Fix Applied:

Verify version is 24.003.20054 or later (continuous track) or 20.005.30655 or later (classic track)

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from AcroRd32.exe or Acrobat.exe
  • Multiple failed PDF parsing attempts
  • Unexpected network connections from Adobe Reader processes

Network Indicators:

  • Outbound connections from Adobe Reader to suspicious domains
  • Unusual DNS queries for PDF-related resources

SIEM Query:

source="windows" AND (process_name="AcroRd32.exe" OR process_name="Acrobat.exe") AND (event_id="4688" OR event_id="1") AND parent_process_name="explorer.exe"

🔗 References

📤 Share & Export