First published: Thu Nov 05 2020(Updated: )
Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) and Adobe Acrobat Pro DC 2017.011.30175 (and earlier) are affected by an improper input validation vulnerability that could result in arbitrary JavaScript execution in the context of the current user. To exploit this issue, an attacker must acquire and then modify a certified PDF document that is trusted by the victim. The attacker then needs to convince the victim to open the document.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | <=20.001.30005 | |
Adobe Acrobat | <=17.011.30175 | |
Adobe Acrobat | <=20.012.20048 | |
Adobe Acrobat Reader | <=20.001.30005 | |
Adobe Acrobat Reader | <=17.011.30175 | |
Adobe Acrobat Reader | <=20.012.20048 | |
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24432 is considered to have a critical severity rating due to the potential for arbitrary JavaScript execution.
To fix CVE-2020-24432, you should update your Adobe Acrobat Reader DC or Adobe Acrobat DC to the latest version provided by Adobe.
CVE-2020-24432 affects Adobe Acrobat Reader DC versions up to 20.001.30005 and Adobe Acrobat DC versions up to 20.012.20048.
The impact of CVE-2020-24432 includes the risk of malicious JavaScript code executing, which can lead to further exploitation of the system.
You can determine vulnerability to CVE-2020-24432 by checking if your software version is 20.001.30005 or earlier for Reader or 20.012.20048 or earlier for Acrobat DC.