First published: Fri Oct 02 2020(Updated: )
An issue was discovered in Foxit Reader and PhantomPDF before 4.1 on macOS. Because the Hardened Runtime protection mechanism is not applied to code signing, code injection (or an information leak) can occur.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxitsoftware Foxit Reader | <4.1 | |
Foxitsoftware Phantompdf | <4.1 | |
Apple macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-26540.
The affected software is Foxit Reader and PhantomPDF before version 4.1 on macOS.
The severity of CVE-2020-26540 is high, with a severity value of 7.5.
Code injection can occur because the Hardened Runtime protection mechanism is not applied to code signing.
No, Apple macOS is not vulnerable to this issue.
You can find more information about this vulnerability at the following link: [Security Bulletins - Foxit Software](https://www.foxitsoftware.com/support/security-bulletins.html).