Skip to content

Adobe Acrobat and Reader Use-After-Free Vulnerability - 20231011002

Overview

Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to application denial-of-service, arbitrary code execution, privilege escalation and memory leak. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

What is the vulnerability?

CVE-2023-21608 - CVSS v3 Base Score: 7.8

What is vulnerable?

The vulnerability affects the following products:

  • Acrobat DC versions 22.003.20282 (Win), 22.003.20281 (Mac) and earlier
  • Acrobat Reader DC versions 22.003.20282 (Win), 22.003.20281 (Mac) and earlier
  • Acrobat 2020 versions 20.005.30418 and earlier
  • Acrobat Reader 2020 versions 20.005.30418 and earlier

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management):