Article Details
Scrape Timestamp (UTC): 2023-10-11 12:26:41.356
Source: https://thehackernews.com/2023/10/us-cybersecurity-agency-warns-of.html
Original Article Text
Click to Toggle View
U.S. Cybersecurity Agency Warns of Actively Exploited Adobe Acrobat Reader Vulnerability. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a high-severity flaw in Adobe Acrobat Reader to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2023-21608 (CVSS score: 7.8), the vulnerability has been described as a use-after-free bug that can be exploited to achieve remote code execution (RCE) with the privileges of the current user. A patch for the flaw was released by Adobe in January 2023. HackSys security researchers Ashfaq Ansari and Krishnakant Patil were credited with discovering and reporting the flaw. The following versions of the software are impacted - Details surrounding the nature of the exploitation and the threat actors that may be abusing CVE-2023-21608 are currently unknown. A proof-of-concept (PoC) exploit for the flaw was made available in late January 2023. CVE-2023-21608 is also the second Adobe Acrobat and Reader vulnerability that has seen in-the-wild exploitation after CVE-2023-26369, an out-of-bounds write issue that could result in code execution by opening a specially crafted PDF document. Federal Civilian Executive Branch (FCEB) agencies are required to apply the vendor-provided patches by October 31, 2023, to secure their networks against potential threats.
Daily Brief Summary
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning for a high-severity flaw in Adobe Acrobat Reader, citing evidence of active exploitation.
Identified as CVE-2023-21608, the vulnerability is described as a use-after-free bug that can be exploited for remote code execution (RCE) with the user's privileges.
Adobe released a patch for the flaw in January 2023, with HackSys security researchers Ashfaq Ansari and Krishnakant Patil credited for its discovery and reporting.
Information regarding the exploitation and the potential threat actors exploiting CVE-2023-21608 is yet to be revealed.
A proof-of-concept (PoC) exploit for the flaw was made available in late January 2023.
The vulnerability is the second Adobe Acrobat and Reader flaw to see in-the-wild exploitation, following CVE-2023-26369, an out-of-bounds write issue.
Federal Civilian Executive Branch (FCEB) agencies are mandated to apply Adobe's vendor-provided patches by October 31, 2023, to protect their networks from potential threats.