First published: Tue Dec 08 2020(Updated: )
Acrobat Reader DC versions 2020.013.20066 (and earlier), 2020.001.30010 (and earlier) and 2017.011.30180 (and earlier) are affected by an information exposure vulnerability, that could enable an attacker to get a DNS interaction and track if the user has opened or closed a PDF file when loaded from the filesystem without a prompt. User interaction is required to exploit this vulnerability.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=17.011.30059<=17.011.30180 | |
Adobe Acrobat Reader | >=20.001.30005<=20.001.30010 | |
Adobe Acrobat | >=15.008.20082<=20.013.20066 | |
Adobe Acrobat Reader | >=17.011.30059<=17.011.30180 | |
Adobe Acrobat Reader | >=20.001.30005<=20.001.30010 | |
Adobe Acrobat Reader | >=15.008.20082<=20.013.20066 | |
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29075 is classified as an information exposure vulnerability that can potentially allow an attacker to track user interaction with PDF files.
To mitigate CVE-2020-29075, update Adobe Acrobat Reader DC to the latest version above 2020.013.20066 or follow Adobe's security recommendations.
CVE-2020-29075 affects Adobe Acrobat Reader DC versions 2020.013.20066 and earlier, 2020.001.30010 and earlier, and 2017.011.30180 and earlier.
Yes, CVE-2020-29075 can potentially be exploited remotely by an attacker to gain unauthorized information about a user's interaction with PDF files.
While updating is the best solution for CVE-2020-29075, users can minimize risk by not opening untrusted PDF files until they apply the latest patches.