CVE-2024-9758
📋 TL;DR
This vulnerability in Tungsten Automation Power PDF allows attackers to read sensitive information from memory when users open malicious PDF files. The flaw exists in how the software handles AcroForm annotations, enabling out-of-bounds memory reads. Users of affected Power PDF versions are at risk.
💻 Affected Systems
- Tungsten Automation Power PDF
📦 What is this software?
Power Pdf by Tungstenautomation
⚠️ Risk & Real-World Impact
Worst Case
Information disclosure combined with other vulnerabilities could lead to arbitrary code execution in the current process context.
Likely Case
Sensitive information disclosure from memory, potentially exposing credentials, document contents, or system information.
If Mitigated
Limited impact with proper security controls, though information leakage still possible.
🎯 Exploit Status
Requires user interaction (opening malicious file) and likely needs chaining with other vulnerabilities for code execution.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in provided references
Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1361/
Restart Required: Yes
Instructions:
1. Check Tungsten Automation security advisories
2. Download and install latest Power PDF update
3. Restart system after installation
4. Verify update applied successfully
🔧 Temporary Workarounds
Disable PDF opening in Power PDF
windowsConfigure system to use alternative PDF viewers for untrusted documents
Application control restrictions
windowsUse application whitelisting to restrict Power PDF execution
🧯 If You Can't Patch
- Use alternative PDF viewing software for untrusted documents
- Implement network segmentation to limit potential impact
🔍 How to Verify
Check if Vulnerable:
Check Power PDF version against vendor advisory. Look for ZDI-CAN-24474 vulnerability status.
Check Version:
Open Power PDF → Help → About to check version
Verify Fix Applied:
Verify Power PDF version is updated beyond vulnerable versions specified in vendor patch notes.
📡 Detection & Monitoring
Log Indicators:
- Power PDF crash logs
- Unexpected memory access errors
- Large number of PDF file openings
Network Indicators:
- PDF downloads from untrusted sources
- Suspicious email attachments
SIEM Query:
Process:PowerPDF.exe AND (EventID:1000 OR EventID:1001) OR FileExtension:pdf AND SourceIP:external