Impact
Acrobat Reader versions 20.005.30793, 20.005.30803, 24.001.30264, 24.001.30273, 25.001.20982 and earlier contain an improper verification of cryptographic signatures that can be abused to bypass signature checks. The flaw allows an attacker to trick users into accepting a forged signature and, as a result, grants the attacker limited ability to write files on the user’s machine. This vulnerability is classified as CWE‑347, reflecting the failure to properly validate a digital signature before trusting its contents.
Affected Systems
The affected product is Adobe Acrobat Reader, including both classic and continuous (DC) editions. Versions 20.005.30793 through 25.001.20982 and earlier are vulnerable on macOS and Windows platforms, as identified by the relevant Common Platform Enumeration entries.
Risk and Exploitability
The CVSS score of 3.3 indicates low severity, and the EPSS score of less than 1% reflects a very low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires the user to interact with a signed PDF, typically by opening it, meaning the attack is user‑initiated and local. While the flaw does not provide remote code execution, it can be leveraged to achieve unauthorized write access, which could be used to drop or modify files within a user’s writable environment.
OpenCVE Enrichment