• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

U.S. Cybersecurity Agency Warns of Actively Exploited Adobe Acrobat Reader Vulnerability

You are here: Home / Cyber Security News / U.S. Cybersecurity Agency Warns of Actively Exploited Adobe Acrobat Reader Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday included a higher-severity flaw in Adobe Acrobat Reader to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

Tracked as CVE-2023-21608 (CVSS rating: 7.8), the vulnerability has been explained as a use-just after-no cost bug that can be exploited to realize remote code execution (RCE) with the privileges of the present-day consumer.

A patch for the flaw was released by Adobe in January 2023. HackSys security researchers Ashfaq Ansari and Krishnakant Patil were credited with finding and reporting the flaw.

The next versions of the software program are impacted –

  • Acrobat DC – 22.003.20282 (Win), 22.003.20281 (Mac) and earlier variations (preset in 22.003.20310)
  • Acrobat Reader DC – 22.003.20282 (Get), 22.003.20281 (Mac) and earlier versions (fastened in 22.003.20310)
  • Acrobat 2020 – 20.005.30418 and previously versions (set in 20.005.30436)
  • Acrobat Reader 2020 – 20.005.30418 and earlier versions (fixed in 20.005.30436)

Information bordering the mother nature of the exploitation and the menace actors that may be abusing CVE-2023-21608 are currently unidentified. A proof-of-notion (PoC) exploit for the flaw was produced obtainable in late January 2023.

CVE-2023-21608 is also the next Adobe Acrobat and Reader vulnerability that has noticed in-the-wild exploitation soon after CVE-2023-26369, an out-of-bounds publish issue that could end result in code execution by opening a specially crafted PDF document.

Federal Civilian Govt Branch (FCEB) agencies are demanded to implement the seller-supplied patches by Oct 31, 2023, to secure their networks in opposition to prospective threats.

Located this report exciting? Abide by us on Twitter  and LinkedIn to study far more distinctive information we article.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Take an Offensive Approach to Password Security by Continuously Monitoring for Breached Passwords
Next Post: Over 17,000 WordPress Sites Compromised by Balada Injector in September 2023 »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes

Copyright © 2025 · AllTech.News, All Rights Reserved.