Vulnerability Details : CVE-2023-44357
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Products affected by CVE-2023-44357
- Adobe » Acrobat Reader » Classic EditionVersions from including (>=) 20.001.30005 and before (<) 20.005.30539cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*
- Adobe » Acrobat » Classic EditionVersions from including (>=) 20.001.30005 and up to, including, (<=) 20.005.30539cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*
- Adobe » Acrobat Dc » Continuous EditionVersions from including (>=) 15.008.20082 and before (<) 23.006.20380cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*
- Adobe » Acrobat Reader Dc » Continuous EditionVersions from including (>=) 15.008.20082 and before (<) 23.006.20380cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-44357
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-44357
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
Adobe Systems Incorporated | |
3.3
|
LOW | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
1.8
|
1.4
|
Adobe Systems Incorporated |
CWE ids for CVE-2023-44357
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: psirt@adobe.com (Primary)
References for CVE-2023-44357
-
https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm
404. Page not found.Broken Link
Jump to