First published: Wed Apr 12 2023(Updated: )
Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30441 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=20.001.3005<=20.005.30441 | |
Adobe Acrobat Dc | >=15.008.20082<=23.001.20093 | |
Adobe Acrobat Reader | >=20.001.3005<=20.005.30441 | |
Adobe Acrobat Reader DC | >=15.008.20082<=23.001.20093 | |
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26417 is a Use After Free vulnerability in Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30441 (and earlier).
CVE-2023-26417 could allow arbitrary code execution in the context of the current user when the vulnerability is exploited.
Yes, exploitation of CVE-2023-26417 requires user interaction in the form of opening a malicious file.
Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30441 (and earlier) are vulnerable to CVE-2023-26417.
CVE-2023-26417 has a severity rating of 7.8, which is classified as high.
To fix CVE-2023-26417, users should update to the latest version of Adobe Acrobat Reader as recommended by Adobe.
More information about CVE-2023-26417 can be found on the Adobe website at this link: [Adobe Security Bulletin APSB23-24](https://helpx.adobe.com/security/products/acrobat/apsb23-24.html).