⚠ Actively exploited
Added to CISA KEV on 2023-10-10. Federal agencies required to patch by 2023-10-31. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..

CVE-2023-21608Use After Free in Adobe Acrobat Reader

CWE-416Use After Free5 documents5 sources
Severity
7.8HIGHNVD
EPSS
79.1%
top 0.93%
CISA KEV
KEV
Added 2023-10-10
Due 2023-10-31
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJan 18
KEV addedOct 10
KEV dueOct 31
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Description

Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

CVEListV5adobe/acrobat_readerunspecified20.005.30418+3
NVDadobe/acrobat_reader20.001.3000520.005.30418
NVDadobe/acrobat_reader_dc15.008.2008222.003.20282+1
NVDadobe/acrobat20.001.3000520.005.30418
NVDadobe/acrobat_dc15.008.2008222.003.20282+1

🔴Vulnerability Details

3
GHSA
GHSA-w7q6-mhgp-7c2h: Adobe Acrobat Reader versions 222023-01-18
CVEList
Adobe Acrobat Reader DC resetForm Use-After-Free Remote Code Execution Vulnerability2023-01-18
VulnCheck
Adobe Acrobat and Reader Use-After-Free Vulnerability2023

📋Vendor Advisories

1
CISA
Adobe Acrobat and Reader Use-After-Free Vulnerability2023-10-10
CVE-2023-21608 — Use After Free in Adobe Acrobat Reader | cvebase