First published: Thu Aug 10 2023(Updated: )
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Untrusted Search Path vulnerability that could lead to Application denial-of-service. An attacker could leverage this vulnerability if the default PowerShell Set-ExecutionPolicy is set to Unrestricted, making the attack complexity high. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Dc | >=15.008.20082<23.003.20269 | |
Adobe Acrobat Reader DC | >=15.008.20082<23.003.20269 | |
Apple macOS | ||
Microsoft Windows | ||
Adobe Acrobat Reader | >=20.001.30005<=20.005.30516.10516 | |
Adobe Acrobat Reader | >=20.001.30005<20.005.30516.10516 | |
Adobe Acrobat Reader | >=20.001.30005<20.005.30514.10514 | |
Adobe Acrobat Reader | >=20.001.30005<20.005.30514.10514 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Adobe Acrobat Reader vulnerability is CVE-2023-29299.
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by this vulnerability.
The severity of CVE-2023-29299 is medium with a CVSS score of 4.7.
The Untrusted Search Path vulnerability could lead to application denial-of-service.
To fix this vulnerability, update Adobe Acrobat Reader to the latest version available.