
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability was discovered in Adobe Acrobat Reader DC's font parsing functionality. The vulnerability, identified as CVE-2022-27790, was reported on January 26, 2022, and publicly disclosed on April 28, 2022. This security flaw affects Adobe Acrobat Reader DC installations and requires user interaction, such as visiting a malicious page or opening a malicious file, to be exploited (ZDI Advisory).
The vulnerability stems from improper validation of object existence before performing operations during the processing of embedded fonts. This use-after-free (CWE-416) vulnerability has been assigned a CVSS score of 7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating its critical severity. The technical assessment shows that while local access is required, no privileges are needed, though user interaction is necessary (Adobe Security, ZDI Advisory).
If successfully exploited, this vulnerability could lead to arbitrary code execution in the context of the current user process. The high CVSS score indicates potential severe impacts on system confidentiality, integrity, and availability (NVD, ZDI Advisory).
Adobe has released a security update to address this vulnerability. Users are advised to apply the available patches through the official Adobe update channels (Adobe Security, ZDI Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."