Vulnerability identifier: #VU115038
Vulnerability risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-693
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Adobe Acrobat
Client/Desktop applications /
Office applications
Adobe Reader
Client/Desktop applications /
Office applications
Vendor: Adobe
Description
The vulnerability allows an attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures. An attacker with physical access to the system can bypass implemented security restrictions.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Adobe Acrobat: 15.006.30306, 15.006.30355, 15.006.30392, 15.006.30394, 15.006.30413, 15.006.30417, 15.006.30418, 15.006.30434 - 19.008.20071, 15.006.30448 - 19.012.20036, 15.006.30452 - 20.001.30020, 15.006.30456 - 20.005.30334, 15.006.30457, 15.006.30461, 15.006.30464, 15.006.30475, 15.006.30482 - 21.007.20096, 15.006.30495, 15.006.30497 - 23.003.20201, 15.006.30498, 15.006.30499, 15.006.30503 - 24.002.20933, 15.006.30504 - 24.004.20272, 15.006.30505 - 25.001.20458, 15.006.30508 - 25.001.20630, 15.006.30510 - 2025.001.20630, 15.006.30518, 15.006.30523, 15.006.30527, 17.008.30051, 17.009.20044, 17.009.20058, 17.011.30066, 17.011.30068, 17.011.30070, 17.011.30078, 17.011.30079, 17.011.30080, 17.011.30096, 17.011.30099, 17.011.30102, 17.011.30105, 17.011.30106, 17.011.30110, 17.011.30113, 17.011.30120, 17.011.30127, 17.011.30142, 17.011.30143, 17.011.30144, 17.011.30148, 17.011.30150, 17.011.30152, 17.011.30156, 17.011.30158, 17.011.30166, 17.011.30171, 17.011.30175, 17.011.30180, 17.011.30188, 17.011.30190, 17.011.30194, 17.011.30196, 17.011.30197, 17.011.30199, 17.011.30202, 17.011.30204, 17.011.30207, 17.012.20098, 17.012.30205, 17.012.30227, 20.005.30362, 20.005.30381, 20.005.30407, 20.005.30418, 20.005.30436, 20.005.30441, 20.005.30467, 20.005.30514.10514, 20.005.30516.10516, 20.005.30524, 20.005.30539, 20.005.30574, 20.005.30635, 20.005.30636, 20.005.30655, 20.005.30680, 20.005.30710, 20.005.30730, 20.005.30748, 20.005.30763, 20.005.30774, 20.006.20034, 20.006.20042, 20.009.20063, 20.009.20065, 20.009.20067, 20.009.20074, 20.012.20041, 20.012.20043, 20.012.20048, 20.013.20064, 20.013.20066, 20.013.20074, 21.001.201, 21.001.20135, 21.001.20138, 21.001.20140, 21.001.20142, 21.001.20145, 21.001.20149, 21.007.20099, 21.011.20039, 22.001.20085, 22.001.20112, 22.001.20117, 22.001.20142, 22.001.20169, 22.002.20191, 22.002.20212, 22.003.20258, 23.003.20215, 23.003.20244, 23.003.20269, 23.003.20284, 23.006.20320, 23.006.20360, 23.006.20380, 23.008.20421, 23.008.20458, 23.008.20470, 23.008.20533, 23.008.20555, 24.001.20604, 24.001.20615, 24.001.20643, 24.001.30123, 24.001.30159, 24.001.30187, 24.001.30193, 24.001.30213
Adobe Reader: 20.001.30002, 20.001.30005, 20.001.30010, 20.001.30018, 20.001.30020, 20.001.30025, 20.004.30005, 20.004.30006 - 23.006.20320, 20.004.30015 - 24.001.30159, 20.004.30017 - 24.003.20054, 20.004.30020 - 25.001.20672, 20.005.30311, 20.005.30314, 20.005.30331, 20.005.30334, 20.005.30362, 20.005.30381, 20.005.30407, 20.005.30418, 20.005.30436, 20.005.30441, 20.005.30467, 20.005.30514.10514, 20.005.30516.10516, 20.005.30524, 20.005.30539, 20.005.30574, 20.005.30635, 20.005.30636, 20.005.30655, 20.005.30680, 20.005.30710, 20.005.30730, 20.005.30748, 20.005.30763, 20.005.30774, 20.006.20034, 20.006.20042, 20.009.20063, 20.009.20074, 20.012.20041, 20.012.20048, 20.013.20064, 20.013.20066, 20.013.20074, 21.001.20135, 21.001.20149, 21.001.20150, 21.001.20155, 21.005.20054, 21.005.20058, 21.005.20060, 21.005.20148, 21.007.20091, 21.007.20095, 21.007.20096, 21.007.20099, 21.011.20039, 22.001.20085, 22.001.20112, 22.001.20117, 22.001.20142, 22.001.20169, 22.002.20191, 22.002.20212, 22.003.20258, 22.003.20282, 22.003.20310, 22.003.20314, 22.003.20322
External links
https://helpx.adobe.com/security/products/acrobat/apsb25-85.html
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.