Security

Patches

Adobe fixed Acrobat bug, neglected to mention whole zero-day exploit thing

SaaS seller sets severity to 'critical'


Adobe's patch for a remote code execution (RCE) bug in Acrobat this week doesn't mention that the vulnerability is considered a zero-day nor that a proof-of-concept (PoC) exploit exists, a researcher warns.

As part of Adobe's Patch Tuesday, the creative software slinger fixed CVE-2024-41869 – a vulnerability originally reported in June by researcher Haifei Li, founder of zero-day and exploit-detection platform Expmon.

Li's warning comes as the vulnerability was only assigned a 7.8-out-of-10 CVSS base score, which doesn't carry the same weight as a critical severity rating. Considering there's a PoC exploit out in the wild, altogether it means sysadmins may not give the vulnerability the level of prioritization it may deserve.

To Adobe's credit, the vendor does say the use-after-free vulnerability carries a "critical" severity rating, despite its CVSS score suggesting the severity is "high" – one rung down from critical.

Expmon originally expected a patch to be released sooner given the June report date, and its account of the process suggests that was the plan all along, but the first fix didn't quite do the job.

"I can confirm our Acrobat product team has identified a secondary fix that is required to fully address this issue," Adobe told Expmon in August. "We are actively reviewing and working to prioritize the fix in an upcoming patch. I will be sure to follow up with you once we have a clear release time frame."

Expmon said it will be sharing the sample PDF it was given that contained the PoC exploit "within the next few days," so patching quickly will be doubly important once the exploit blueprint is out there for all to peruse.

The PDF file doesn't contain a full exploit as it stands, Expmon said when it announced the discovery in June. There was no malicious payload found in the sample, but the groundwork was laid for a very possible RCE attack. As it stands it just leads to a crash of the Acrobat Reader app.

Once the sample is released, however, it likely won't be long before that groundwork is utilized by some baddies.

It's unclear why Adobe never mentioned the existence of a PoC or that researchers deemed it a zero-day vulnerability. We got in touch with the vendor for answers and will update the story if it responds.

Given the CVSS score wasn't in the critical range, defenders usually appreciate additional information such as whether working exploits are known to the vendor, so their patching process can be better informed.

More details about the issue will be disseminated in the upcoming blog co-authored by Expmon and Check Point Research. ®

Send us news
4 Comments

Nominet probes network intrusion linked to Ivanti zero-day exploit

Unauthorized activity detected, but no backdoors found

Cryptojacking, backdoors abound as fiends abuse Aviatrix Controller bug

This is what happens when you publish PoCs immediately, hm?

Zero-day exploits plague Ivanti Connect Secure appliances for second year running

Factory resets and apply patches is the advice amid fortnight delay for other appliances

MediaTek rings in the new year with a parade of chipset vulns

Manufacturers should have had ample time to apply the fixes

Microsoft fixes under-attack privilege-escalation holes in Hyper-V

Plus: Excel hell, angst for Adobe fans, and life's too Snort for Cisco

I tried hard, but didn't fix all of cybersecurity, admits outgoing US National Cyber Director

In colossal surprise, ONCD boss Harry Coker says more work is needed

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Datacus extractus: Harry Potter publisher breached without resorting to magic

PLUS: Allstate sued for allegedly tracking drivers; Dutch DDoS; More fake jobs from Pyongyang; and more

Six vulnerabilities in ubiquitous rsync tool announced and fixed in a day

Turns out tool does both file transfers and security fixes fast

Infoseccer: Private security biz let guard down, exposed 120K+ files

Assist Security’s client list includes fashion icons, critical infrastructure orgs

Snyk appears to deploy 'malicious' packages targeting Cursor for unknown reason

Packages removed, vendor said to have apologized to AI code editor as onlookers say it could have been a test

DEF CON's hacker-in-chief faces fortune in medical bills after paralyzing neck injury

Marc Rogers is 'lucky to be alive'