CVE-2024-9755
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JP2 image files in Tungsten Automation Power PDF. The flaw exists in how the software parses JP2 files without proper bounds checking, enabling out-of-bounds reads that can lead to remote code execution. All users of affected Power PDF versions are at risk.
💻 Affected Systems
- Tungsten Automation Power PDF
📦 What is this software?
Power Pdf by Tungstenautomation
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining the same privileges as the PDF application user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Malicious actor executes code in the context of the PDF application, potentially stealing documents, installing malware, or establishing persistence on the system.
If Mitigated
Application crashes or becomes unresponsive when processing malicious JP2 files, but no code execution occurs due to security controls like ASLR or DEP.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious file) and bypassing memory protections; ZDI advisory suggests code execution is possible
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Tungsten Automation security advisory for specific patched version
Vendor Advisory: https://www.tungstenautomation.com/security
Restart Required: Yes
Instructions:
1. Check current Power PDF version
2. Visit Tungsten Automation security advisory page
3. Download and install latest security update
4. Restart system if prompted
🔧 Temporary Workarounds
Disable JP2 file association
windowsRemove JP2 file type association with Power PDF to prevent automatic opening
Control Panel > Default Programs > Associate a file type or protocol with a program > Select .jp2 > Change program > Choose different application
Block JP2 files at perimeter
allConfigure email/web gateways to block JP2 file attachments
🧯 If You Can't Patch
- Implement application whitelisting to prevent unauthorized PDF viewers
- Use network segmentation to isolate PDF processing systems
🔍 How to Verify
Check if Vulnerable:
Check Power PDF version against vendor's security advisory; if using affected version and can open JP2 files, system is vulnerable
Check Version:
Open Power PDF > Help > About Power PDF
Verify Fix Applied:
Verify Power PDF version is updated to patched version specified in vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Power PDF crash logs when processing JP2 files
- Unexpected process creation from PDF viewer
- Memory access violation errors in application logs
Network Indicators:
- Downloads of JP2 files from untrusted sources
- Outbound connections from PDF application to suspicious IPs
SIEM Query:
source="PowerPDF" AND (event_type="crash" OR process_name="powershell.exe" OR cmdline="*suspicious*"))