First published: Wed Aug 14 2024(Updated: )
Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.30005<20.005.30655 | |
Adobe Acrobat Reader | >=24.001.20604<24.001.30159 | |
Adobe Acrobat Reader | >=15.008.20082<24.002.21005 | |
Adobe Acrobat Reader Notification Manager | >=20.001.3005<20.005.30655 | |
Adobe Acrobat Reader Notification Manager | >=15.008.20082<24.002.21005 | |
Any of | ||
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41831 is classified as a critical vulnerability due to its potential for arbitrary code execution.
To mitigate CVE-2024-41831, users should update Adobe Acrobat Reader to versions later than 20.005.30655 or 24.001.30159.
CVE-2024-41831 affects Adobe Acrobat Reader versions up to 20.005.30636 and 24.002.20965, among others.
CVE-2024-41831 is a Use After Free vulnerability that can lead to arbitrary code execution when exploited.
Yes, exploiting CVE-2024-41831 requires user interaction to trigger the vulnerability.