First published: Thu Nov 05 2020(Updated: )
Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) for macOS are affected by a security feature bypass that could result in dynamic library code injection by the Adobe Reader process. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | <=20.001.30005 | |
Adobe Acrobat | <=17.011.30175 | |
Adobe Acrobat | <=20.012.20048 | |
Adobe Acrobat Reader | <=20.001.30005 | |
Adobe Acrobat Reader | <=17.011.30175 | |
Adobe Acrobat Reader | <=20.012.20048 | |
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-24431 is classified as important due to its potential for dynamic library code injection.
To fix CVE-2020-24431, update Adobe Acrobat Reader DC or Adobe Acrobat DC to the latest versions available.
CVE-2020-24431 affects Acrobat Reader DC versions up to 20.001.30005, Acrobat DC versions up to 20.012.20048, and certain versions of Acrobat DC 2017.
CVE-2020-24431 can lead to a security feature bypass, allowing for unauthorized code injection into Adobe Reader processes on macOS.
CVE-2020-24431 may allow attackers to exploit the vulnerability, but successful exploitation typically requires local access to the affected system.