Vulnerability Description
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Violation of Secure Design Principles vulnerability that could result in arbitrary code execution in the context of the current user by bypassing the API blacklisting feature. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Adobe | Acrobat Dc | >= 15.008.20082, < 23.003.20269 |
| Adobe | Acrobat Reader Dc | >= 15.008.20082, < 23.003.20269 |
| Apple | Macos | - |
| Microsoft | Windows | - |
| Adobe | Acrobat | >= 20.001.30005, <= 20.005.30516.10516 |
| Adobe | Acrobat Reader | >= 20.001.30005, < 20.005.30516.10516 |
Related Weaknesses (CWE)
References
- https://helpx.adobe.com/security/products/acrobat/apsb23-30.htmlRelease NotesVendor Advisory
- https://helpx.adobe.com/security/products/acrobat/apsb23-30.htmlRelease NotesVendor Advisory
FAQ
What is CVE-2023-29320?
CVE-2023-29320 is a vulnerability with a CVSS score of 7.8 (HIGH). Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Violation of Secure Design Principles vulnerability that could result in arbitrary code execu...
How severe is CVE-2023-29320?
CVE-2023-29320 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-29320?
Check the references section above for vendor advisories and patch information. Affected products include: Adobe Acrobat Dc, Adobe Acrobat Reader Dc, Apple Macos, Microsoft Windows, Adobe Acrobat.