CVE-2024-9764
📋 TL;DR
A use-after-free vulnerability in Tungsten Automation Power PDF allows remote attackers to execute arbitrary code when users open malicious PDF files. This affects all users of vulnerable versions of Power PDF software. Successful exploitation gives attackers control over the affected system with the same privileges as the current user.
💻 Affected Systems
- Tungsten Automation Power PDF
📦 What is this software?
Power Pdf by Tungstenautomation
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to data theft, ransomware deployment, or persistent backdoor installation.
Likely Case
Malware installation, credential theft, or lateral movement within the network.
If Mitigated
Limited impact with proper application sandboxing and user privilege restrictions.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious file). No public exploit code available at time of advisory.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Tungsten Automation security advisory for specific patched version.
Vendor Advisory: https://www.tungstenautomation.com/security
Restart Required: Yes
Instructions:
1. Check current Power PDF version
2. Visit Tungsten Automation security advisory page
3. Download and install latest patched version
4. Restart system after installation
🔧 Temporary Workarounds
Disable PDF file association
windowsPrevent Power PDF from automatically opening PDF files
Control Panel > Default Programs > Set Associations > Change .pdf association to alternative viewer
Application sandboxing
windowsRun Power PDF in restricted environment
🧯 If You Can't Patch
- Implement application allowlisting to block Power PDF execution
- Deploy network segmentation to isolate systems running Power PDF
🔍 How to Verify
Check if Vulnerable:
Check Power PDF version against vendor's patched version list
Check Version:
Open Power PDF > Help > About
Verify Fix Applied:
Verify installed version matches or exceeds patched version from vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Power PDF crash logs with memory access violations
- Unexpected child processes spawned from Power PDF
Network Indicators:
- Outbound connections from Power PDF to unknown IPs
- DNS requests for suspicious domains after PDF opening
SIEM Query:
process_name:"PowerPDF.exe" AND (event_id:1000 OR parent_process:unexpected)