CVE-2024-9750

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PNG files in Tungsten Automation Power PDF. The flaw exists in PNG file parsing where improper data validation enables out-of-bounds reads that can lead to remote code execution. All users of affected Power PDF versions are at risk.

💻 Affected Systems

Products:
  • Tungsten Automation Power PDF
Versions: Specific versions not detailed in provided information - check vendor advisory for exact affected versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects PNG file parsing functionality; all installations with default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the PDF application user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to data exfiltration, malware installation, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Application crash or denial of service if exploit attempts are blocked by security controls, with no code execution achieved.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and knowledge of PNG file structure manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tungsten Automation security advisory for specific patched version

Vendor Advisory: https://www.tungstenautomation.com/security

Restart Required: Yes

Instructions:

1. Visit Tungsten Automation security advisory page
2. Download latest patched version of Power PDF
3. Install update following vendor instructions
4. Restart system if required

🔧 Temporary Workarounds

Disable PNG file handling

windows

Configure Power PDF to not process PNG files or use alternative PDF software for PNG-containing documents

Application control restrictions

windows

Use application whitelisting to restrict Power PDF execution to trusted directories only

🧯 If You Can't Patch

  • Implement strict email filtering to block PNG attachments
  • Deploy endpoint detection and response (EDR) with memory protection features

🔍 How to Verify

Check if Vulnerable:

Check Power PDF version against vendor's security advisory for affected versions

Check Version:

Open Power PDF → Help → About or check installed programs in Windows Control Panel

Verify Fix Applied:

Verify Power PDF version matches or exceeds patched version specified in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Power PDF crash logs with memory access violations
  • Unexpected process spawning from Power PDF executable

Network Indicators:

  • Unusual outbound connections from Power PDF process
  • DNS requests to suspicious domains following PDF opening

SIEM Query:

Process Creation where (Image contains 'PowerPDF' OR ParentImage contains 'PowerPDF') AND CommandLine contains '.png'

🔗 References

📤 Share & Export