First published: Wed May 11 2022(Updated: )
Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader DC | >=15.008.20082<=22.001.20085 | |
Adobe Acrobat Reader | >=15.008.20082<=22.001.20085 | |
macOS | ||
Microsoft Windows Operating System | ||
Adobe Acrobat Reader | >=17.011.30059<=17.012.30205 | |
Adobe Acrobat Reader Notification Manager | >=17.011.30059<=17.012.30205 | |
Adobe Acrobat Reader | >=20.001.30005<=20.005.30314 | |
Adobe Acrobat Reader Notification Manager | >=20.001.30005<=20.005.30314 | |
Adobe Acrobat Reader | >=20.001.30005<=20.005.30311 | |
Adobe Acrobat Reader Notification Manager | >=20.001.30005<=20.005.30311 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28250 is classified as a critical vulnerability due to its potential to disclose sensitive memory information.
To remediate CVE-2022-28250, users should update Adobe Acrobat Reader DC to version 22.001.2011 or later, or the corresponding versions for other affected products.
CVE-2022-28250 affects Adobe Acrobat Reader DC versions 22.001.2011 and earlier, 20.005.3033 and earlier, and 17.012.3022 and earlier.
CVE-2022-28250 primarily allows for sensitive memory disclosure rather than direct arbitrary code execution.
There are no known workarounds for CVE-2022-28250 other than applying the necessary updates to the affected software.