Remote Code Execution Vulnerability in Kofax Power PDF Due to U3D File Parsing
CVE-2023-51606
7.8HIGH
Summary
A vulnerability exists in Kofax Power PDF related to the parsing of U3D files, which can lead to out-of-bounds read conditions. This flaw is a result of inadequate validation of user-supplied data, allowing attackers to potentially execute arbitrary code within the context of the application. Successful exploitation requires user interaction, as the target must navigate to a malicious page or open a compromised file. Security measures should be taken to mitigate the risks associated with this vulnerability, such as user education and ensuring that all software is kept up-to-date with the latest security patches.
Affected Version(s)
Power PDF 5.0.0.57 (5.0.0.10)
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published