Rapid7 Vulnerability & Exploit Database

APSB23-30: Adobe Acrobat and Reader for Windows and macOS (CVE-2023-38234)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

APSB23-30: Adobe Acrobat and Reader for Windows and macOS (CVE-2023-38234)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
08/10/2023
Created
08/22/2023
Added
08/22/2023
Modified
08/22/2023

Description

Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Solution(s)

  • adobe-acrobat-dc-upgrade-23-003-20269-macosx
  • adobe-acrobat-dc-upgrade-23-003-20269-windows
  • adobe-acrobat-reader-dc-upgrade-23-003-20269-macosx
  • adobe-acrobat-reader-dc-upgrade-23-003-20269-windows
  • adobe-acrobat-reader-upgrade-20-005-30514-10514-windows
  • adobe-acrobat-reader-upgrade-20-005-30516-10516-macosx
  • adobe-acrobat-upgrade-20-005-30514-10514-windows
  • adobe-acrobat-upgrade-20-005-30516-10516-macosx

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;