First published: Wed Jan 18 2023(Updated: )
Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a Creation of Temporary File in Directory with Incorrect Permissions vulnerability that could result in privilege escalation in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat | >=15.008.20082<=22.003.20282 | |
Adobe Acrobat Reader | >=15.008.20082<=22.003.20282 | |
Microsoft Windows | ||
Adobe Acrobat | >=15.008.20082<=22.003.20281 | |
Adobe Acrobat Reader | >=15.008.20082<=22.003.20281 | |
Apple iOS and macOS | ||
Adobe Acrobat Reader | >=20.001.30005<=20.005.30418 | |
Adobe Acrobat Reader | >=20.001.30005<=20.005.30418 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-21612 has been classified as a critical vulnerability that could lead to privilege escalation.
To fix CVE-2023-21612, update your Adobe Acrobat Reader or Acrobat DC to the latest version provided by Adobe.
CVE-2023-21612 affects Adobe Acrobat Reader versions 22.003.20282 and earlier, as well as Adobe Acrobat versions 20.005.30418 and earlier.
CVE-2023-21612 requires local access for exploitation, so it cannot be exploited remotely.
Exploitation of CVE-2023-21612 could result in unauthorized escalation of privileges, allowing attackers to perform actions beyond their normal access.