First published: Wed May 11 2022(Updated: )
Acrobat Pro DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat | >=15.008.20082<=22.001.20085 | |
Adobe Acrobat Reader | >=15.008.20082<=22.001.20085 | |
Apple iOS and macOS | ||
Microsoft Windows | ||
Adobe Acrobat Reader | >=17.011.30059<=17.012.30205 | |
Adobe Acrobat Reader | >=17.011.30059<=17.012.30205 | |
Adobe Acrobat Reader | >=20.001.30005<=20.005.30314 | |
Adobe Acrobat Reader | >=20.001.30005<=20.005.30314 | |
Adobe Acrobat Reader | >=20.001.30005<=20.005.30311 | |
Adobe Acrobat Reader | >=20.001.30005<=20.005.30311 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28837 has been rated as a high-severity vulnerability due to the potential disclosure of sensitive memory.
To fix CVE-2022-28837, update Adobe Acrobat DC or Adobe Acrobat Reader DC to the latest versions provided by Adobe.
CVE-2022-28837 affects Adobe Acrobat Pro DC version 22.001.2011x and earlier, as well as several earlier versions of Adobe Acrobat Reader.
CVE-2022-28837 is classified as a use-after-free vulnerability, which can lead to the exposure of sensitive information.
Yes, an attacker could exploit CVE-2022-28837 remotely to bypass security mitigations and access sensitive information.