First published: Thu Nov 16 2023(Updated: )
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Acrobat Dc | >=15.008.20082<23.006.20380 | |
Adobe Acrobat Reader DC | >=15.008.20082<23.006.20380 | |
Any of | ||
Apple macOS | ||
Microsoft Windows | ||
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.30005<=20.005.30539 | |
Adobe Acrobat Reader | >=20.001.30005<20.005.30539 | |
Any of | ||
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44372 is a Use After Free vulnerability in Adobe Acrobat Reader that could lead to arbitrary code execution.
CVE-2023-44372 affects Adobe Acrobat Reader versions 23.006.20360 and earlier, and 20.005.30524 and earlier.
CVE-2023-44372 has a severity rating of 7.8 (high).
Exploiting CVE-2023-44372 requires user interaction, as the victim must open a malicious file.
You can find more information about CVE-2023-44372 at the following link: [Adobe Security Bulletin APSB23-54](https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm).