Power PDF File Parsing Use-After-Free Remote Code Execution Vulnerability
CVE-2023-44436

7.8HIGH

Key Information:

Vendor
Kofax
Status
Vendor
CVE Published:
3 May 2024

Summary

The vulnerability in Kofax Power PDF stems from a flaw in its PDF file parsing mechanism, where the program fails to properly validate the existence of an object before executing operations on it. This lack of validation creates an opportunity for remote attackers to exploit the system by convincing users to visit a malicious web page or open a compromised file. Upon successful exploitation, attackers can execute arbitrary code within the context of the affected application, potentially leading to unauthorized access and system compromise. Users and organizations utilizing Kofax Power PDF are encouraged to remain vigilant and update their software to mitigate the risks associated with this vulnerability.

Affected Version(s)

Power PDF 5.0.0.57 (5.0.0.10.0.23307)

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.