First published: Thu Aug 10 2023(Updated: )
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Violation of Secure Design Principles vulnerability that could result in arbitrary code execution in the context of the current user by bypassing the API blacklisting feature. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Dc | >=15.008.20082<23.003.20269 | |
Adobe Acrobat Reader DC | >=15.008.20082<23.003.20269 | |
Apple macOS | ||
Microsoft Windows | ||
Adobe Acrobat Reader | >=20.001.30005<=20.005.30516.10516 | |
Adobe Acrobat Reader | >=20.001.30005<20.005.30516.10516 | |
Adobe Acrobat Reader | >=20.001.30005<20.005.30514.10514 | |
Adobe Acrobat Reader | >=20.001.30005<20.005.30514.10514 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Adobe Acrobat Reader vulnerability is CVE-2023-29320.
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by this vulnerability.
The severity of CVE-2023-29320 is high with a CVSS score of 7.8.
This vulnerability in Adobe Acrobat Reader allows arbitrary code execution by bypassing the API blacklisting feature.
To fix the CVE-2023-29320 vulnerability in Adobe Acrobat Reader, it is recommended to update to a version that is not vulnerable.