CVE-2024-9747
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PSD files in Tungsten Automation Power PDF. The flaw exists in PSD file parsing where improper data validation leads to buffer overflow. All users running affected versions of Power PDF are at risk.
💻 Affected Systems
- Tungsten Automation Power PDF
📦 What is this software?
Power Pdf by Tungstenautomation
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the victim's machine, data theft, ransomware deployment, and lateral movement within the network.
Likely Case
Malware installation, data exfiltration, or system disruption when users open malicious PSD files from untrusted sources.
If Mitigated
Limited impact with proper security controls, potentially only application crash or denial of service.
🎯 Exploit Status
Exploitation requires user interaction but no authentication. ZDI has confirmed the vulnerability exists.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Tungsten Automation security advisory for specific patched version
Vendor Advisory: https://www.tungstenautomation.com/security
Restart Required: Yes
Instructions:
1. Visit Tungsten Automation security advisory page
2. Download latest version of Power PDF
3. Install update following vendor instructions
4. Restart system if prompted
🔧 Temporary Workarounds
Disable PSD file association
windowsRemove Power PDF as default handler for PSD files to prevent automatic opening
Control Panel > Default Programs > Set Associations > Find .psd > Change to different program
Block PSD files at perimeter
allPrevent PSD files from entering network via email or web
🧯 If You Can't Patch
- Implement application whitelisting to prevent unauthorized executables
- Use endpoint protection with memory protection and exploit mitigation
🔍 How to Verify
Check if Vulnerable:
Check Power PDF version against vendor advisory. If using unpatched version, assume vulnerable.
Check Version:
Open Power PDF > Help > About or check installed programs in Control Panel
Verify Fix Applied:
Verify Power PDF version matches or exceeds patched version in vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Power PDF crash logs
- Unexpected process creation from Power PDF
- Memory access violation events
Network Indicators:
- Downloads of PSD files from untrusted sources
- Outbound connections after PSD file opening
SIEM Query:
Process Creation where Image contains 'PowerPDF' AND Parent Process contains 'explorer' OR Command Line contains '.psd'