Vulnerability Details : CVE-2018-18688
The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, an Incremental Saving vulnerability exists in multiple products. When an attacker uses the Incremental Saving feature to add pages or annotations, Body Updates are displayed to the user without any action by the signature-validation logic. This affects Foxit Reader before 9.4 and PhantomPDF before 8.3.9 and 9.x before 9.4. It also affects LibreOffice, Master PDF Editor, Nitro Pro, Nitro Reader, Nuance Power PDF Standard, PDF Editor 6 Pro, PDFelement6 Pro, PDF Studio Viewer 2018, PDF Studio Pro, Perfect PDF 10 Premium, and Perfect PDF Reader.
Products affected by CVE-2018-18688
- cpe:2.3:a:foxitsoftware:foxit_reader:9.4:*:*:*:*:*:*:*
- cpe:2.3:a:foxitsoftware:foxit_reader:9.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:foxitsoftware:foxit_reader:9.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*
- cpe:2.3:a:foxitsoftware:phantompdf:8.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:libreoffice:libreoffice:6.0.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:libreoffice:libreoffice:6.1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:libreoffice:libreoffice:6.1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:nuance:power_pdf_standard:3.0.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:nuance:power_pdf_standard:3.0.0.30:*:*:*:*:*:*:*
- cpe:2.3:a:nuance:power_pdf_standard:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:gonitro:nitro_pro:11.0.3.173:*:*:*:*:*:*:*
- cpe:2.3:a:gonitro:nitro_reader:5.5.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:code-industry:master_pdf_editor:5.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:code-industry:master_pdf_editor:5.1.68:*:*:*:*:*:*:*
- cpe:2.3:a:code-industry:master_pdf_editor:5.1.24:*:*:*:*:*:*:*
- cpe:2.3:a:iskysoft:pdf_editor_6:6.4.2.3521:*:*:*:professional:*:*:*
- cpe:2.3:a:iskysoft:pdf_editor_6:6.6.2.3315:*:*:*:professional:*:*:*
- cpe:2.3:a:iskysoft:pdf_editor_6:6.7.6.3399:*:*:*:professional:*:*:*
- cpe:2.3:a:iskysoft:pdfelement6:6.8.0.3523:*:*:*:professional:*:*:*
- cpe:2.3:a:iskysoft:pdfelement6:6.8.4.3921:*:*:*:professional:*:*:*
- cpe:2.3:a:iskysoft:pdfelement6:6.7.1.3355:*:*:*:professional:*:*:*
- cpe:2.3:a:iskysoft:pdfelement6:6.7.6.3399:*:*:*:professional:*:*:*
- cpe:2.3:a:qoppa:pdf_studio:12.0.7:*:*:*:professional:*:*:*
- cpe:2.3:a:qoppa:pdf_studio_viewer_2018:2018.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:qoppa:pdf_studio_viewer_2018:2018.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:soft-xpansion:perfect_pdf_10:10.0.0.1:*:*:*:premium:*:*:*
- cpe:2.3:a:soft-xpansion:perfect_pdf_reader:13.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:soft-xpansion:perfect_pdf_reader:13.1.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-18688
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 54 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-18688
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2018-18688
-
The product does not verify, or incorrectly verifies, the cryptographic signature for data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-18688
-
https://www.pdfa.org/recently-identified-pdf-digital-signature-vulnerabilities/
Recently identified PDF digital signature vulnerabilities – PDF AssociationThird Party Advisory
-
https://pdf-insecurity.org/signature/signature.html
PDF Insecurity WebsiteThird Party Advisory
-
https://pdf-insecurity.org/signature/evaluation_2018.html
PDF Insecurity WebsiteThird Party Advisory
-
https://www.foxitsoftware.com/support/security-bulletins.php
Security Bulletins | Foxit SoftwareVendor Advisory
Jump to