First published: Thu Feb 15 2024(Updated: )
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Acrobat | >=15.008.20082<23.008.20533 | |
Adobe Acrobat Reader | >=15.008.20082<23.008.20533 | |
Any of | ||
Apple iOS and macOS | ||
Microsoft Windows | ||
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.30005<20.005.30574 | |
Adobe Acrobat Reader | >=20.001.30005<20.005.30574 | |
Any of | ||
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20730 is considered a critical vulnerability due to the potential for arbitrary code execution.
To fix CVE-2024-20730, users should update to the latest version of Adobe Acrobat Reader or Acrobat that addresses this vulnerability.
CVE-2024-20730 affects Adobe Acrobat Reader versions up to 20.005.30574 and 23.008.20470, and earlier versions.
CVE-2024-20730 is characterized as an Integer Overflow or Wraparound vulnerability.
Exploitation of CVE-2024-20730 requires that the victim interacts with the malicious document.