First published: Thu Aug 11 2022(Updated: )
Adobe Acrobat Reader versions 22.001.20169 (and earlier), 20.005.30362 (and earlier) and 17.012.30249 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat | >=15.008.20082<=22.001.20169 | |
Adobe Acrobat Reader | >=15.008.20082<=22.001.20169 | |
Apple iOS and macOS | ||
Microsoft Windows | ||
Adobe Acrobat Reader | >=20.001.30005<=20.005.30362 | |
Adobe Acrobat Reader | >=20.001.30005<=20.005.30362 | |
Adobe Acrobat Reader | >=17.011.30059<=17.012.30249 | |
Adobe Acrobat Reader | >=17.011.30059<=17.012.30249 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35670 is classified as a critical vulnerability due to its potential to allow sensitive memory disclosure.
To fix CVE-2022-35670, you should update Adobe Acrobat Reader to the latest version available.
Versions 22.001.20169 and earlier, 20.005.30362 and earlier, and 17.012.30249 and earlier of Adobe Acrobat are affected by CVE-2022-35670.
Yes, CVE-2022-35670 can potentially be exploited by an attacker to remotely execute code through crafted PDF files.
CVE-2022-35670 is categorized as a Use After Free vulnerability.