
Cloud Vulnerability DB
A community-led vulnerabilities database
Adobe Acrobat and Reader versions 2020.006.20034 and earlier, 2017.011.30158 and earlier, and 2015.006.30510 and earlier were found to contain an insecure library loading (DLL hijacking) vulnerability. The vulnerability was assigned CVE-2020-3803 and was discovered by Huw Pigott of Shearwater Solutions, a CyberCX company (NVD, Adobe Advisory).
The vulnerability is classified as an uncontrolled search path element (CWE-427) issue. It received a CVSS v3.1 base score of 7.8 (High), with the following vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This indicates that the vulnerability requires local access and user interaction, but no privileges, and can result in high impacts to confidentiality, integrity, and availability (NVD).
Successful exploitation of this vulnerability could lead to privilege escalation on affected systems. The high CVSS score indicates that the vulnerability could potentially allow an attacker to gain elevated access to system resources that are normally protected (NVD).
Adobe has addressed this vulnerability in updated versions of the affected software. Users should update their Adobe Acrobat and Reader installations to versions newer than 2020.006.20034, 2017.011.30158, and 2015.006.30510 respectively (Adobe Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."