
Cloud Vulnerability DB
A community-led vulnerabilities database
Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30441 (and earlier) are affected by an out-of-bounds read vulnerability, identified as CVE-2023-26397. The vulnerability was discovered by Kai Lu of Zscaler's ThreatLabz and was publicly disclosed on April 12, 2023. This security issue affects multiple versions of Adobe Acrobat and Acrobat Reader, including both Classic and Continuous releases (Adobe Advisory).
The vulnerability is classified as an out-of-bounds read vulnerability (CWE-125) that could potentially expose sensitive memory information. The vulnerability has received a CVSS v3.1 Base Score of 5.5 (Medium), with a vector string of CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N. This indicates that the vulnerability requires local access and user interaction, but could lead to high confidentiality impact (NVD Database).
If successfully exploited, this vulnerability could lead to the disclosure of sensitive memory information. More significantly, attackers could potentially leverage this vulnerability to bypass security mitigations such as Address Space Layout Randomization (ASLR), which could make other attacks more feasible (CVE Database).
Adobe has addressed this vulnerability in their security update. Users are advised to update their Adobe Acrobat and Reader installations to versions newer than 23.001.20093 for continuous track and 20.005.30441 for classic track (Adobe Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."