First published: Mon Apr 01 2024(Updated: )
PDF-XChange Editor Updater Improper Certificate Validation Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is not required to exploit this vulnerability. The specific flaw exists within the update functionality. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22224.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
PDF-XChange | =10.1.1.381 | |
Tracker Software PDF-XChange Editor | =10.1.1.381 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27323 has a high severity rating due to its potential for remote code execution.
To fix CVE-2024-27323, you should update PDF-XChange Editor to the latest version provided by the vendor.
CVE-2024-27323 affects installations of PDF-XChange Editor version 10.1.1.381 and potentially other versions if they share the same vulnerability.
CVE-2024-27323 enables network-adjacent attackers to execute arbitrary code on affected installations.
No, user interaction is not required to exploit CVE-2024-27323.