Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-9715 (GCVE-0-2020-9715)
Vulnerability from cvelistv5 – Published: 2020-08-19 00:00 – Updated: 2026-04-13 22:20- Use-after-free
| Vendor | Product | Version | |
|---|---|---|---|
| Adobe | Adobe Acrobat and Reader |
Affected:
2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier versions
|
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-416 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | Acrobat |
| Due Date | 2026-04-27 |
| Date Added | 2026-04-13 |
| Vendorproject | Adobe |
| Vulnerabilityname | Adobe Acrobat Use-After-Free Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T10:34:39.919Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-991/"
},
{
"tags": [
"x_transferred"
],
"url": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2020-9715",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-13T17:04:28.691097Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2026-04-13",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-9715"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-13T22:20:25.649Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-9715"
}
],
"timeline": [
{
"lang": "en",
"time": "2026-04-13T00:00:00.000Z",
"value": "CVE-2020-9715 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Adobe Acrobat and Reader",
"vendor": "Adobe",
"versions": [
{
"status": "affected",
"version": "2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Use-after-free ",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-07T00:00:00.000Z",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-991/"
},
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html"
},
{
"url": "https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2020-9715",
"datePublished": "2020-08-19T00:00:00.000Z",
"dateReserved": "2020-03-02T00:00:00.000Z",
"dateUpdated": "2026-04-13T22:20:25.649Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2020-9715",
"cwes": "[\"CWE-416\"]",
"dateAdded": "2026-04-13",
"dueDate": "2026-04-27",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html ; https://nvd.nist.gov/vuln/detail/CVE-2020-9715",
"product": "Acrobat",
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "Adobe Acrobat contains a use-after-free vulnerability that allows for code execution",
"vendorProject": "Adobe",
"vulnerabilityName": "Adobe Acrobat Use-After-Free Vulnerability"
},
"epss": {
"cve": "CVE-2020-9715",
"date": "2026-05-18",
"epss": "0.77499",
"percentile": "0.99002"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-9715\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2020-08-19T14:15:13.407\",\"lastModified\":\"2026-04-14T14:45:00.160\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .\"},{\"lang\":\"es\",\"value\":\"Adobe Acrobat and Reader versiones 2020.009.20074 y anteriores, versiones 2020.001.30002, 2017.011.30171 y anteriores, y versiones 2015.006.30523 y anteriores, presentan una vulnerabilidad de uso de la memoria previamente liberada. Una explotaci\u00f3n con \u00e9xito podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo arbitraria.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"cisaExploitAdd\":\"2026-04-13\",\"cisaActionDue\":\"2026-04-27\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Adobe Acrobat Use-After-Free Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*\",\"versionStartIncluding\":\"15.006.30060\",\"versionEndIncluding\":\"15.006.30523\",\"matchCriteriaId\":\"FF9AD23D-2478-40F9-8504-3363EC18A582\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*\",\"versionStartIncluding\":\"15.008.20082\",\"versionEndIncluding\":\"20.009.20074\",\"matchCriteriaId\":\"CC5FFE53-2682-44E5-B888-4A0E3DDBE19C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*\",\"versionStartIncluding\":\"17.011.30059\",\"versionEndIncluding\":\"17.011.30171\",\"matchCriteriaId\":\"FB59932A-B454-4F9D-B346-9CB083CCFE9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_dc:20.001.30002:*:*:*:classic:*:*:*\",\"matchCriteriaId\":\"A8E2402A-9025-4322-86D2-B65ABB33AFA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*\",\"versionStartIncluding\":\"15.006.30060\",\"versionEndIncluding\":\"15.006.30523\",\"matchCriteriaId\":\"6F4B8A87-4022-4787-9FC4-342732DF35FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*\",\"versionStartIncluding\":\"15.008.20082\",\"versionEndIncluding\":\"20.009.20074\",\"matchCriteriaId\":\"38776DFA-9B6F-4417-A664-ACFA8979CA42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*\",\"versionStartIncluding\":\"17.011.30059\",\"versionEndIncluding\":\"17.011.30171\",\"matchCriteriaId\":\"1E735417-A682-4000-978A-E880254A5A23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader_dc:20.001.30002:*:*:*:classic:*:*:*\",\"matchCriteriaId\":\"8E9B6A3E-04DA-47D9-99E5-8F4030511BE1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"387021A0-AF36-463C-A605-32EA7DAC172E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://helpx.adobe.com/security/products/acrobat/apsb20-48.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-20-991/\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://helpx.adobe.com/security/products/acrobat/apsb20-48.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-20-991/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-9715\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-991/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://helpx.adobe.com/security/products/acrobat/apsb20-48.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T10:34:39.919Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-9715\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-13T17:04:28.691097Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2026-04-13\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-9715\"}}}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-9715\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-05T13:17:43.704Z\"}, \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-04-13T00:00:00.000Z\", \"value\": \"CVE-2020-9715 added to CISA KEV\"}]}], \"cna\": {\"affected\": [{\"vendor\": \"Adobe\", \"product\": \"Adobe Acrobat and Reader\", \"versions\": [{\"status\": \"affected\", \"version\": \"2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier versions\"}]}], \"references\": [{\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-991/\"}, {\"url\": \"https://helpx.adobe.com/security/products/acrobat/apsb20-48.html\"}, {\"url\": \"https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Use-after-free \"}]}], \"providerMetadata\": {\"orgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"shortName\": \"adobe\", \"dateUpdated\": \"2022-12-07T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2020-9715\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-13T22:20:25.649Z\", \"dateReserved\": \"2020-03-02T00:00:00.000Z\", \"assignerOrgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"datePublished\": \"2020-08-19T00:00:00.000Z\", \"assignerShortName\": \"adobe\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GSD-2020-9715
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2020-9715",
"description": "Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .",
"id": "GSD-2020-9715"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-9715"
],
"details": "Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .",
"id": "GSD-2020-9715",
"modified": "2023-12-13T01:21:53.224286Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2020-9715",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": "2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier versions"
}
]
}
}
]
},
"vendor_name": "Adobe"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use-after-free "
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-991/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-991/"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html",
"refsource": "MISC",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html"
},
{
"name": "https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/",
"refsource": "MISC",
"url": "https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.006.30523",
"versionStartIncluding": "15.006.30060",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20.009.20074",
"versionStartIncluding": "15.008.20082",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe_name": [],
"versionEndIncluding": "17.011.30171",
"versionStartIncluding": "17.011.30059",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_dc:20.001.30002:*:*:*:classic:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.006.30523",
"versionStartIncluding": "15.006.30060",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe_name": [],
"versionEndIncluding": "20.009.20074",
"versionStartIncluding": "15.008.20082",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe_name": [],
"versionEndIncluding": "17.011.30171",
"versionStartIncluding": "17.011.30059",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader_dc:20.001.30002:*:*:*:classic:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2020-9715"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-991/",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-991/"
},
{
"name": "https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/",
"refsource": "MISC",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-02-03T19:05Z",
"publishedDate": "2020-08-19T14:15Z"
}
}
}
CERTFR-2020-AVI-496
Vulnerability from certfr_avis - Published: 2020-08-11 - Updated: 2020-08-11
De multiples vulnérabilités ont été découvertes dans Adobe Reader et Acrobat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Adobe | Acrobat | Acrobat Reader 2020 versions antérieures à 2020.001.30005 sur Windows et macOS | ||
| Adobe | Acrobat | Acrobat DC versions antérieures à 2020.012.20041 sur Windows et macOS | ||
| Adobe | Acrobat | Acrobat Reader DC versions antérieures à 2020.012.20041 sur Windows et macOS | ||
| Adobe | Acrobat | Acrobat Reader 2017 versions antérieures à 2017.011.30175 sur Windows et macOS | ||
| Adobe | Acrobat | Acrobat 2015 versions antérieures à 2015.006.30527 sur Windows et macOS | ||
| Adobe | Acrobat | Acrobat Reader 2015 versions antérieures à 2015.006.30527 sur Windows et macOS | ||
| Adobe | Acrobat | Acrobat 2020 versions antérieures à 2020.001.30005 sur Windows et macOS | ||
| Adobe | Acrobat | Acrobat 2017 versions antérieures à 2017.011.30175 sur Windows et macOS |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 2020.001.30005 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Acrobat DC versions ant\u00e9rieures \u00e0 2020.012.20041 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 2020.012.20041 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Acrobat Reader 2017 versions ant\u00e9rieures \u00e0 2017.011.30175 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Acrobat 2015 versions ant\u00e9rieures \u00e0 2015.006.30527 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Acrobat Reader 2015 versions ant\u00e9rieures \u00e0 2015.006.30527 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 2020.001.30005 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Acrobat 2017 versions ant\u00e9rieures \u00e0 2017.011.30175 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-9703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9703"
},
{
"name": "CVE-2020-9704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9704"
},
{
"name": "CVE-2020-9700",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9700"
},
{
"name": "CVE-2020-9722",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9722"
},
{
"name": "CVE-2020-9721",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9721"
},
{
"name": "CVE-2020-9712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9712"
},
{
"name": "CVE-2020-9696",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9696"
},
{
"name": "CVE-2020-9702",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9702"
},
{
"name": "CVE-2020-9707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9707"
},
{
"name": "CVE-2020-9693",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9693"
},
{
"name": "CVE-2020-9720",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9720"
},
{
"name": "CVE-2020-9698",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9698"
},
{
"name": "CVE-2020-9706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9706"
},
{
"name": "CVE-2020-9723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9723"
},
{
"name": "CVE-2020-9710",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9710"
},
{
"name": "CVE-2020-9719",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9719"
},
{
"name": "CVE-2020-9699",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9699"
},
{
"name": "CVE-2020-9694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9694"
},
{
"name": "CVE-2020-9701",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9701"
},
{
"name": "CVE-2020-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9714"
},
{
"name": "CVE-2020-9715",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9715"
},
{
"name": "CVE-2020-9716",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9716"
},
{
"name": "CVE-2020-9705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9705"
},
{
"name": "CVE-2020-9717",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9717"
},
{
"name": "CVE-2020-9697",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9697"
},
{
"name": "CVE-2020-9718",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9718"
}
],
"initial_release_date": "2020-08-11T00:00:00",
"last_revision_date": "2020-08-11T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-496",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-08-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Adobe Reader et\nAcrobat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Reader et Acrobat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb20-48 du 11 ao\u00fbt 2020",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html"
}
]
}
WID-SEC-W-2026-1068
Vulnerability from csaf_certbund - Published: 2020-08-11 22:00 - Updated: 2026-04-13 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Adobe Acrobat <2020.001.30005
Adobe / Acrobat
|
<2020.001.30005 | ||
|
Adobe Acrobat <2017.011.30175
Adobe / Acrobat
|
<2017.011.30175 | ||
|
Adobe Acrobat <2015.006.30527
Adobe / Acrobat
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2015.006.30527
Adobe / Acrobat Reader
|
<2015.006.30527 | ||
|
Adobe Acrobat Reader <2017.011.30175
Adobe / Acrobat Reader
|
<2017.011.30175 | ||
|
Adobe Acrobat Reader <2020.001.30005
Adobe / Acrobat Reader
|
<2020.001.30005 | ||
|
Adobe Acrobat DC <2020.012.20041
Adobe / Acrobat DC
|
<2020.012.20041 | ||
|
Adobe Acrobat Reader DC <2020.012.20041
Adobe / Acrobat Reader DC
|
<2020.012.20041 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Adobe Acrobat ist ein Programm f\u00fcr die Erstellung und Betrachtung von Dokumenten im Adobe Portable Document Format (PDF).\r\nAdobe Reader und Acrobat Reader sind Programme f\u00fcr die Anzeige von Dokumenten im Adobe Portable Document Format (PDF).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Adobe Acrobat und Adobe Acrobat Reader ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1068 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2026-1068.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1068 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1068"
},
{
"category": "external",
"summary": "Adobe Security Bulletin: APSB20-48 vom 2020-08-11",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html"
},
{
"category": "external",
"summary": "CISA Known Exploited Vulnerabilities Catalog vom 2026-04-13",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"source_lang": "en-US",
"title": "Adobe Acrobat und Acrobat Reader: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-13T22:00:00.000+00:00",
"generator": {
"date": "2026-04-14T08:49:18.653+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-1068",
"initial_release_date": "2020-08-11T22:00:00.000+00:00",
"revision_history": [
{
"date": "2020-08-11T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-04-13T22:00:00.000+00:00",
"number": "2",
"summary": "Aktive Ausnutzung gemeldet"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2020.001.30005",
"product": {
"name": "Adobe Acrobat \u003c2020.001.30005",
"product_id": "T017079"
}
},
{
"category": "product_version",
"name": "2020.001.30005",
"product": {
"name": "Adobe Acrobat 2020.001.30005",
"product_id": "T017079-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:acrobat:2020.001.30005"
}
}
},
{
"category": "product_version_range",
"name": "\u003c2017.011.30175",
"product": {
"name": "Adobe Acrobat \u003c2017.011.30175",
"product_id": "T017080"
}
},
{
"category": "product_version",
"name": "2017.011.30175",
"product": {
"name": "Adobe Acrobat 2017.011.30175",
"product_id": "T017080-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:acrobat:2017.011.30175"
}
}
},
{
"category": "product_version_range",
"name": "\u003c2015.006.30527",
"product": {
"name": "Adobe Acrobat \u003c2015.006.30527",
"product_id": "T017081"
}
},
{
"category": "product_version",
"name": "2015.006.30527",
"product": {
"name": "Adobe Acrobat 2015.006.30527",
"product_id": "T017081-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:acrobat:2015.006.30527"
}
}
}
],
"category": "product_name",
"name": "Acrobat"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2020.012.20041",
"product": {
"name": "Adobe Acrobat DC \u003c2020.012.20041",
"product_id": "T017085"
}
},
{
"category": "product_version",
"name": "2020.012.20041",
"product": {
"name": "Adobe Acrobat DC 2020.012.20041",
"product_id": "T017085-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:acrobat_dc:2020.012.20041"
}
}
}
],
"category": "product_name",
"name": "Acrobat DC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2015.006.30527",
"product": {
"name": "Adobe Acrobat Reader \u003c2015.006.30527",
"product_id": "T017082"
}
},
{
"category": "product_version",
"name": "2015.006.30527",
"product": {
"name": "Adobe Acrobat Reader 2015.006.30527",
"product_id": "T017082-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:acrobat_reader:2015.006.30527"
}
}
},
{
"category": "product_version_range",
"name": "\u003c2017.011.30175",
"product": {
"name": "Adobe Acrobat Reader \u003c2017.011.30175",
"product_id": "T017083"
}
},
{
"category": "product_version",
"name": "2017.011.30175",
"product": {
"name": "Adobe Acrobat Reader 2017.011.30175",
"product_id": "T017083-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:acrobat_reader:2017.011.30175"
}
}
},
{
"category": "product_version_range",
"name": "\u003c2020.001.30005",
"product": {
"name": "Adobe Acrobat Reader \u003c2020.001.30005",
"product_id": "T017084"
}
},
{
"category": "product_version",
"name": "2020.001.30005",
"product": {
"name": "Adobe Acrobat Reader 2020.001.30005",
"product_id": "T017084-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:acrobat_reader:2020.001.30005"
}
}
}
],
"category": "product_name",
"name": "Acrobat Reader"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2020.012.20041",
"product": {
"name": "Adobe Acrobat Reader DC \u003c2020.012.20041",
"product_id": "T017086"
}
},
{
"category": "product_version",
"name": "2020.012.20041",
"product": {
"name": "Adobe Acrobat Reader DC 2020.012.20041",
"product_id": "T017086-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:acrobat_reader_dc:2020.012.20041"
}
}
}
],
"category": "product_name",
"name": "Acrobat Reader DC"
}
],
"category": "vendor",
"name": "Adobe"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-9693",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9693"
},
{
"cve": "CVE-2020-9694",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9694"
},
{
"cve": "CVE-2020-9696",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9696"
},
{
"cve": "CVE-2020-9697",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9697"
},
{
"cve": "CVE-2020-9698",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9698"
},
{
"cve": "CVE-2020-9699",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9699"
},
{
"cve": "CVE-2020-9700",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9700"
},
{
"cve": "CVE-2020-9701",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9701"
},
{
"cve": "CVE-2020-9702",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9702"
},
{
"cve": "CVE-2020-9703",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9703"
},
{
"cve": "CVE-2020-9704",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9704"
},
{
"cve": "CVE-2020-9705",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9705"
},
{
"cve": "CVE-2020-9706",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9706"
},
{
"cve": "CVE-2020-9707",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9707"
},
{
"cve": "CVE-2020-9710",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9710"
},
{
"cve": "CVE-2020-9712",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9712"
},
{
"cve": "CVE-2020-9714",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9714"
},
{
"cve": "CVE-2020-9715",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9715"
},
{
"cve": "CVE-2020-9716",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9716"
},
{
"cve": "CVE-2020-9717",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9717"
},
{
"cve": "CVE-2020-9718",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9718"
},
{
"cve": "CVE-2020-9719",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9719"
},
{
"cve": "CVE-2020-9720",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9720"
},
{
"cve": "CVE-2020-9721",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9721"
},
{
"cve": "CVE-2020-9722",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9722"
},
{
"cve": "CVE-2020-9723",
"product_status": {
"known_affected": [
"T017079",
"T017080",
"T017081",
"T017082",
"T017083",
"T017084",
"T017085",
"T017086"
]
},
"release_date": "2020-08-11T22:00:00.000+00:00",
"title": "CVE-2020-9723"
}
]
}
CNVD-2020-46027
Vulnerability from cnvd - Published: 2020-08-14厂商已发布了漏洞修复程序,请及时关注更新: https://helpx.adobe.com/security/products/acrobat/apsb20-48.html
| Name | ['Adobe Acrobat DC (Continuous) <=2020.009.20074', 'Adobe Acrobat Reader DC (Continuous) <=2020.009.20074', 'Adobe Acrobat 2020 (Classic 2020) 2020.001.30002', 'Adobe Acrobat Reader 2020 (Classic 2020) 2020.001.30002', 'Adobe Acrobat 2017 (Classic 2017) <=2017.011.30171', 'Adobe Acrobat Reader 2017 (Classic 2017) <=2017.011.30171', 'Adobe Acrobat 2015 (Classic 2015) <=2015.006.30523', 'Adobe Acrobat Reader 2015 (Classic 2015) <=2015.006.30523'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-9715",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-9715"
}
},
"description": "Adobe Reader(\u4e5f\u88ab\u79f0\u4e3aAcrobat Reader)\u662fAdobe\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u6b3ePDF\u6587\u4ef6\u9605\u8bfb\u8f6f\u4ef6\u3002Adobe Acrobat\u662f\u7531Adobe\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u6b3ePDF\u7f16\u8f91\u8f6f\u4ef6\u3002\n\nAdobe Acrobat/Reader\u5b58\u5728\u91ca\u653e\u540e\u91cd\u7528\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://helpx.adobe.com/security/products/acrobat/apsb20-48.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-46027",
"openTime": "2020-08-14",
"patchDescription": "Adobe Reader(\u4e5f\u88ab\u79f0\u4e3aAcrobat Reader)\u662fAdobe\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u6b3ePDF\u6587\u4ef6\u9605\u8bfb\u8f6f\u4ef6\u3002Adobe Acrobat\u662f\u7531Adobe\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u6b3ePDF\u7f16\u8f91\u8f6f\u4ef6\u3002\r\n\r\nAdobe Acrobat/Reader\u5b58\u5728\u91ca\u653e\u540e\u91cd\u7528\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Adobe Acrobat/Reader\u91ca\u653e\u540e\u91cd\u7528\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Adobe Acrobat DC (Continuous) \u003c=2020.009.20074",
"Adobe Acrobat Reader DC (Continuous) \u003c=2020.009.20074",
"Adobe Acrobat 2020 (Classic 2020) 2020.001.30002",
"Adobe Acrobat Reader 2020 (Classic 2020) 2020.001.30002",
"Adobe Acrobat 2017 (Classic 2017) \u003c=2017.011.30171",
"Adobe Acrobat Reader 2017 (Classic 2017) \u003c=2017.011.30171",
"Adobe Acrobat 2015 (Classic 2015) \u003c=2015.006.30523",
"Adobe Acrobat Reader 2015 (Classic 2015) \u003c=2015.006.30523"
]
},
"referenceLink": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html",
"serverity": "\u4e2d",
"submitTime": "2020-08-12",
"title": "Adobe Acrobat/Reader\u91ca\u653e\u540e\u91cd\u7528\u6f0f\u6d1e"
}
BDU:2020-04115
Vulnerability from fstec - Published: 11.08.2020{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Adobe Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 2020.012.20041 Continuous (Adobe Acrobat Document Cloud), \u0434\u043e 2020.012.20041 Continuous (Adobe Acrobat Reader Document Cloud), \u0434\u043e 2017.011.30175 Classic 2017 (Adobe Acrobat 2017), \u0434\u043e 2017.011.30175 Classic 2017 (Adobe Acrobat Reader 2017), \u0434\u043e 2015.006.30527 Classic 2015 (Adobe Acrobat 2015), \u0434\u043e 2015.006.30527 Classic 2015 (Adobe Acrobat Reader 2015), \u0434\u043e 2020.001.30005 Classic 2020 (Adobe Acrobat 2020), \u0434\u043e 2020.001.30005 Classic 2020 (Adobe Acrobat Reader 2020)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://helpx.adobe.com/security/products/acrobat/apsb20-48.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "11.08.2020",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "13.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "02.09.2020",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2020-04115",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-9715",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Adobe Acrobat Document Cloud, Adobe Acrobat Reader Document Cloud, Adobe Acrobat 2017, Adobe Acrobat Reader 2017, Adobe Acrobat 2015, Adobe Acrobat Reader 2015, Adobe Acrobat 2020, Adobe Acrobat Reader 2020",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Apple Inc. MacOS . , Microsoft Corp Windows - ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430 PDF-\u0444\u0430\u0439\u043b\u043e\u0432 Adobe Reader Document Cloud, Adobe Reader \u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0440\u0435\u0434\u0430\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f PDF-\u0444\u0430\u0439\u043b\u043e\u0432 Adobe Acrobat Document Cloud, Adobe Acrobat, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430 PDF-\u0444\u0430\u0439\u043b\u043e\u0432 Adobe Reader Document Cloud, Adobe Reader \u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0440\u0435\u0434\u0430\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f PDF-\u0444\u0430\u0439\u043b\u043e\u0432 Adobe Acrobat Document Cloud, Adobe Acrobat \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html\nhttps://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
GHSA-WXG9-XX37-XJ49
Vulnerability from github – Published: 2022-05-24 17:26 – Updated: 2026-04-13 18:30Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .
{
"affected": [],
"aliases": [
"CVE-2020-9715"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-08-19T14:15:00Z",
"severity": "HIGH"
},
"details": "Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .",
"id": "GHSA-wxg9-xx37-xj49",
"modified": "2026-04-13T18:30:34Z",
"published": "2022-05-24T17:26:11Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9715"
},
{
"type": "WEB",
"url": "https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc"
},
{
"type": "WEB",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-9715"
},
{
"type": "WEB",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-991"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2020-9715
Vulnerability from fkie_nvd - Published: 2020-08-19 14:15 - Updated: 2026-04-14 14:457.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| psirt@adobe.com | https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/ | Exploit, Patch, Third Party Advisory | |
| psirt@adobe.com | https://helpx.adobe.com/security/products/acrobat/apsb20-48.html | Vendor Advisory | |
| psirt@adobe.com | https://www.zerodayinitiative.com/advisories/ZDI-20-991/ | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/ | Exploit, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/acrobat/apsb20-48.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-20-991/ | Third Party Advisory, VDB Entry | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-9715 | US Government Resource |
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | acrobat_dc | * | |
| adobe | acrobat_dc | * | |
| adobe | acrobat_dc | * | |
| adobe | acrobat_dc | 20.001.30002 | |
| adobe | acrobat_reader_dc | * | |
| adobe | acrobat_reader_dc | * | |
| adobe | acrobat_reader_dc | * | |
| adobe | acrobat_reader_dc | 20.001.30002 | |
| apple | macos | - | |
| microsoft | windows | - |
{
"cisaActionDue": "2026-04-27",
"cisaExploitAdd": "2026-04-13",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Adobe Acrobat Use-After-Free Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"matchCriteriaId": "FF9AD23D-2478-40F9-8504-3363EC18A582",
"versionEndIncluding": "15.006.30523",
"versionStartIncluding": "15.006.30060",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"matchCriteriaId": "CC5FFE53-2682-44E5-B888-4A0E3DDBE19C",
"versionEndIncluding": "20.009.20074",
"versionStartIncluding": "15.008.20082",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"matchCriteriaId": "FB59932A-B454-4F9D-B346-9CB083CCFE9C",
"versionEndIncluding": "17.011.30171",
"versionStartIncluding": "17.011.30059",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_dc:20.001.30002:*:*:*:classic:*:*:*",
"matchCriteriaId": "A8E2402A-9025-4322-86D2-B65ABB33AFA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"matchCriteriaId": "6F4B8A87-4022-4787-9FC4-342732DF35FD",
"versionEndIncluding": "15.006.30523",
"versionStartIncluding": "15.006.30060",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"matchCriteriaId": "38776DFA-9B6F-4417-A664-ACFA8979CA42",
"versionEndIncluding": "20.009.20074",
"versionStartIncluding": "15.008.20082",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"matchCriteriaId": "1E735417-A682-4000-978A-E880254A5A23",
"versionEndIncluding": "17.011.30171",
"versionStartIncluding": "17.011.30059",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:20.001.30002:*:*:*:classic:*:*:*",
"matchCriteriaId": "8E9B6A3E-04DA-47D9-99E5-8F4030511BE1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution ."
},
{
"lang": "es",
"value": "Adobe Acrobat and Reader versiones 2020.009.20074 y anteriores, versiones 2020.001.30002, 2017.011.30171 y anteriores, y versiones 2015.006.30523 y anteriores, presentan una vulnerabilidad de uso de la memoria previamente liberada. Una explotaci\u00f3n con \u00e9xito podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo arbitraria."
}
],
"id": "CVE-2020-9715",
"lastModified": "2026-04-14T14:45:00.160",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2020-08-19T14:15:13.407",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/"
},
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html"
},
{
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-991/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-991/"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-9715"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.