Description:
Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities. A remote attacker would entice a targeted user to open a specially crafted PDF file to exploit the vulnerabilities.
Affected Systems:
- Acrobat DC (for Windows and macOS) Continuous 22.001.20085 and earlier versions
- Acrobat Reader DC (for Windows and macOS) Continuous 22.001.20085 and earlier versions
- Acrobat 2020 (for Windows) Classic 2020 20.005.30314 and earlier versions
- Acrobat Reader 2020 (for Windows) Classic 2020 20.005.30314 and earlier versions
- Acrobat 2020 (for macOS) Classic 2020 20.005.30311 and earlier versions
- Acrobat Reader 2020 (for macOS) Classic 2020 20.005.30311 and earlier versions
- Acrobat 2017 (for Windows and macOS) Classic 2017 17.012.30205 and earlier versions
- Acrobat Reader 2017 (for Windows and macOS) Classic 2017 17.012.30205 and earlier versions
Impact:
A successful exploitation could lead to arbitrary code execution, information disclosure, privilege escalation and security feature bypass on an affected system.
Recommendation:
Users of affected systems should update the Adobe Reader and Acrobat to the following versions to address the issues. The updates can be obtained by using the auto-update mechanism or by downloading at the following URLs:
- Acrobat DC (for Windows) Continuous 22.001.20117 and Acrobat DC (for macOS) Continuous 22.001.20112
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
- Acrobat Reader DC (for Windows) Continuous 22.001.20117 and Acrobat Reader DC (for macOS) Continuous 22.001.20112
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
- Acrobat 2020 (for Windows) Classic 2020 20.005.30334 and Acrobat 2020 (for macOS) Classic 2020 20.005.30331
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#classic-track
- Acrobat Reader 2020 (for Windows) Classic 2020 20.005.30334 and Acrobat Reader 2020 (for macOS) Classic 2020 20.005.30331
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#classic-track
- Acrobat 2017 (for Windows) Classic 2017 17.012.30229 and Acrobat 2017 (for macOS) Classic 2017 17.012.30227
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#id3
- Acrobat Reader 2017 (for Windows) Classic 2017 17.012.30229 and Acrobat Reader 2017 (for macOS) Classic 2017 17.012.30227
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#id3
More Information:
- https://helpx.adobe.com/security/products/acrobat/apsb22-16.html
- https://www.hkcert.org/security-bulletin/adobe-monthly-security-update-april-2022
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24101 (to CVE-2022-24104)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27785 (to CVE-2022-27802)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28230 (to CVE-2022-28269)