CVE-2024-45112
Sept. 19, 2024, 2:56 p.m.
7.8
High
Description
Acrobat Reader versions 24.002.21005, 24.001.30159, 20.005.30655, 24.003.20054 and earlier are affected by a Type Confusion vulnerability that could result in arbitrary code execution in the context of the current user. This issue occurs when a resource is accessed using a type that is not compatible with the actual object type, leading to a logic error that an attacker could exploit. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Product(s) Impacted
Vendor | Product | Versions |
---|---|---|
Adobe |
|
|
Apple |
|
|
Microsoft |
|
|
Weaknesses
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
*CPE(s)
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
a | adobe | acrobat | / | / | / | / | classic | / | / | / |
a | adobe | acrobat | / | / | / | / | classic | / | / | / |
a | adobe | acrobat_dc | / | / | / | / | continuous | / | / | / |
a | adobe | acrobat_reader | / | / | / | / | classic | / | / | / |
a | adobe | acrobat_reader_dc | / | / | / | / | continuous | / | / | / |
o | apple | macos | / | / | / | / | / | / | / | / |
o | microsoft | windows | / | / | / | / | / | / | / | / |
Tags
CVSS Score
CVSS Data
- Attack Vector: LOCAL
- Attack Complexity: LOW
- Privileges Required: NONE
- Scope: UNCHANGED
- Confidentiality Impact: HIGH
- Integrity Impact: HIGH
- Availability Impact: HIGH
View Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Date
- Published: Sept. 13, 2024, 9:15 a.m.
- Last Modified: Sept. 19, 2024, 2:56 p.m.
Status : Analyzed
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
psirt@adobe.com
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.