Impact
Adobe Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier suffer from an improper certificate validation flaw that can allow an attacker to spoof the identity of a document signer, thereby bypassing the software’s security checks. The flaw does not provide remote code execution but can undermine user confidence in signed PDFs and facilitate social‑engineering attacks by convincing users that a malicious file originates from a trusted source.
Affected Systems
Adobe Acrobat Reader, including the Acrobat Reader DC family. Versions affected are 24.001.30307, 24.001.30308, 25.001.21265 and all earlier releases. The vulnerability applies across platforms where Acrobat Reader is deployed, including macOS and Windows operating systems.
Risk and Exploitability
The CVSS v3.1 score of 5.5 marks this as a medium‑severity weakness, and the EPSS probability is listed as less than 1 percent, indicating low likelihood of exploitation at present. The Adobe advisory specifies that the flaw requires user interaction; typically this would involve opening a malicious PDF that contains a forged signature. The flaw is not listed in the CISA KEV catalog, so no known active exploits have been reported publicly yet. Nonetheless, the ability to fake the identity of a signer poses a significant risk in environments where document authenticity is critical.
OpenCVE Enrichment