Table of Contents
  • Home
  • /
  • Blog
  • /
  • How To Fix CVE-2022-24091(2)- New RCE Vulnerabilities In Adobe Acrobat Reader DC
March 23, 2022
|
5m

How To Fix CVE-2022-24091(2)- New RCE Vulnerabilities In Adobe Acrobat Reader DC


How To Fix Cve 2022 240912 New Rce Vulnerabilities In Adobe Acrobat Reader Dc

Abode has disclosed a couple of new RCE vulnerability in Acrobat Reader affecting both macOS and Windows. Successful exploitation of these vulnerabilities can lead to arbitrary code execution, application denial of service, memory leak, privilege escalation, and security feature bypass. There is a need to fix this vulnerability. This article will show you how to fix CVE-2022-24091 (2), RCE vulnerability in Adobe Acrobat Reader.

User interaction is needed to exploit this vulnerability in a way that the target must open a malicious file or visit a malicious page. The flaw exists within the embedded font parsing. This problem exists due to a lack of proper validation of user data, resulting in a write past end of an allocated buffer. Attackers can use this vulnerability to execute malicious code in the context of the current process.

Adobe Acrobat Reader DC

Adobe Acrobat Reader is a free cross-platform allowing users to create, view, collaborate, sign, and annotate PDF files. Its an essential PDF tool that can convert any document virtually to PDF format while preserving the form and content of the original file.

Moreover, it gives the ability to create and edit images and texts in PDF documents. Adobe Acrobat Reader is an advanced version of the Adobe Reader with additional functionalities, such as the ability to scan a paper document.

Summary Of The New RCE Vulnerabilities In Adobe Acrobat Reader- CVE-2022-24091(2):

CVE-2022-24091(2) remote code execution vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Reader DC. It exists within the parsing of embedded fonts.

Associated CVE IDCVE-2022-24091(2)
DescriptionRCE Vulnerabilities in Adobe Acrobat Reader DC
Associated ZDI ID
CVSS Score7.8 High
VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Impact Score
Exploitability Score
Attack Vector (AV)Local
Attack Complexity (AC)Low
Privilege Required (PR)Low
User Interaction (UI)None
ScopeUnchanged
Confidentiality (C)High
Integrity (I)High
availability (a)High

Version Affected By These RCE Vulnerabilities:

Here is the list of versions affected by CVE-2022-24091 (2) Remote Code Execution Vulnerability.

Product TrackAffected VersionsPlatforms
Acrobat DCContinuous21.007.20099 and earlier versionsWindows
Acrobat Reader DCContinuous21.007.20099 and earlier versionsWindows
Acrobat DCContinuous21.007.20099 and earlier versionsmacOS
Acrobat Reader DCContinuous21.007.20099 and earlier versionsmacOS
Acrobat 2017Classic 201717.011.30204  and earlier versionsWindows & macOS
Acrobat Reader 2017Classic 201717.011.30204  and earlier versionsWindows & macOS
Acrobat 2020Classic 202020.004.30017 and earlier versionsWindows & macOS
Acrobat Reader 2020Classic 202020.004.30017 and earlier versionsWindows & macOS

How To Fix CVE-2022-24091(2)- New RCE Vulnerabilities In Adobe Acrobat Reader DC?

This section will discuss how to fix CVE-2022-24091 (2), RCE vulnerabilities in Adobe Acrobat Reader. Adobe categorized the following updates with these priority ratings and recommends updating to the latest versions.

ProductUpdated VersionPlatformPriority Rating
Acrobat DC21.011.20039Windows & macOS2
Acrobat Reader DC21.011.20039Windows & macOS2
Acrobat 201717.011.30207Windows & macOS2
Acrobat Reader 201717.011.30207Windows & macOS2
Acrobat 202020.004.30020Windows & macOS2
Acrobat Reader 202020.004.30020Windows & macOS2

Adobe Recommends Software Installation Updates To The Latest Versions Using The Following Instructions.

The product version is available to users through one of the following methods.

  1. For Individuals

  • The product will automatically update without requiring user intervention after detecting the updates.

  • Users can manually update product installations by selecting Help > Check for Updates.

  • The Acrobat Reader installer can be downloaded here.

2. For IT administrators:

  • Refer to particular release note version for installer links.

  • Push the updates through your preferred methodologies, such as bootstrapper, AIP-GPO, SCUP/SCCM, or on macOS, Remote Desktop, and SSH.

How to Update Adobe Acrobat manually?

Step 1. Check for Updates

Launch application then go to Help > Check for updates.

Step 2. Download the updates

You will see Download and Install button enabled if there are updates available.

Step 3. Close the program

Upon the completion of download process, you may see a prompt to close the application as shown here. close Acrobat and click Retry.

Step 4. Install the updates

You will see Update Successful! message upon the completion of the update. Close the app. Thats the end of the manual upgrade process.

We hope this post would help you know How to Fix CVE-2022-24091(2)- New RCE Vulnerabilities in Adobe Acrobat Reader DC. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this. 

You may also like these articles:

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Vulnerabilities

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe