CVE-2024-9755

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JP2 image files in Tungsten Automation Power PDF. The flaw exists in how the software parses JP2 files without proper bounds checking, enabling out-of-bounds reads that can lead to remote code execution. All users of affected Power PDF versions are at risk.

💻 Affected Systems

Products:
  • Tungsten Automation Power PDF
Versions: Specific versions not detailed in provided references; check vendor advisory for exact affected versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects JP2 file parsing functionality; any installation that can open JP2 files is vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the PDF application user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malicious actor executes code in the context of the PDF application, potentially stealing documents, installing malware, or establishing persistence on the system.

🟢

If Mitigated

Application crashes or becomes unresponsive when processing malicious JP2 files, but no code execution occurs due to security controls like ASLR or DEP.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and bypassing memory protections; ZDI advisory suggests code execution is possible

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tungsten Automation security advisory for specific patched version

Vendor Advisory: https://www.tungstenautomation.com/security

Restart Required: Yes

Instructions:

1. Check current Power PDF version
2. Visit Tungsten Automation security advisory page
3. Download and install latest security update
4. Restart system if prompted

🔧 Temporary Workarounds

Disable JP2 file association

windows

Remove JP2 file type association with Power PDF to prevent automatic opening

Control Panel > Default Programs > Associate a file type or protocol with a program > Select .jp2 > Change program > Choose different application

Block JP2 files at perimeter

all

Configure email/web gateways to block JP2 file attachments

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized PDF viewers
  • Use network segmentation to isolate PDF processing systems

🔍 How to Verify

Check if Vulnerable:

Check Power PDF version against vendor's security advisory; if using affected version and can open JP2 files, system is vulnerable

Check Version:

Open Power PDF > Help > About Power PDF

Verify Fix Applied:

Verify Power PDF version is updated to patched version specified in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Power PDF crash logs when processing JP2 files
  • Unexpected process creation from PDF viewer
  • Memory access violation errors in application logs

Network Indicators:

  • Downloads of JP2 files from untrusted sources
  • Outbound connections from PDF application to suspicious IPs

SIEM Query:

source="PowerPDF" AND (event_type="crash" OR process_name="powershell.exe" OR cmdline="*suspicious*"))

🔗 References

📤 Share & Export