Remote Code Execution Vulnerability in Tungsten Automation Power PDF
CVE-2024-9739
7.8HIGH
What is CVE-2024-9739?
The vulnerability present in Tungsten Automation's Power PDF product is rooted in the improper validation of user-supplied data during the parsing of PDF files. This flaw can lead to a memory corruption condition, enabling remote attackers to execute arbitrary code on the affected systems. To exploit this issue, an attacker must convince a user to visit a malicious webpage or open a specially crafted PDF file. This highlights the importance of maintaining updated security protocols and being cautious about PDF file sources.
Affected Version(s)
Power PDF 5.0.0.10.0.23307
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
CVSS V3.0
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
