
Cloud Vulnerability DB
A community-led vulnerabilities database
Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier were found to contain a use-after-free vulnerability. The vulnerability was assigned CVE-2020-3745 and was disclosed in February 2020 (NVD, Adobe Advisory).
The vulnerability is classified as a use-after-free flaw, which occurs when a program continues to use a pointer after it has been freed. This critical vulnerability received a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and no required privileges or user interaction. Under CVSS v2.0, it received a base score of 10.0 (NVD).
Successful exploitation of this vulnerability could lead to arbitrary code execution in the context of the current user. Given the critical CVSS score and the widespread use of Adobe Acrobat and Reader, the potential impact of this vulnerability is severe (NVD, Threatpost).
Adobe addressed this vulnerability in their February 2020 security update. Users are advised to update to the latest version of Adobe Acrobat and Reader. The fix was released as part of a larger security update that addressed multiple vulnerabilities (Adobe Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."