ゼットスケーラーのセキュリティアドバイザリ

セキュリティ アドバイザリー - August 10, 2022

Zscaler protects against 7 new vulnerabilities for Adobe Acrobat and Reader

Zscaler, working with Microsoft through their MAPP program, has proactively deployed protections for the following 7 vulnerabilities included in the August 2022 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the August release and deploy additional protections, as necessary.

APSB22-39 – Security updates available for Adobe Acrobat and Reader.

Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address multiple critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution and memory leak.

Affected Software

  • Acrobat DC Continuous 22.001.20169 and earlier versions for Windows &  macOS
  • Acrobat Reader DC Continuous 22.001.20169 and earlier versions for Windows & macOS
  • Acrobat 2020 Classic 2020 20.005.30362 and earlier versions for Windows & macOS
  • Acrobat Reader 2020 Classic 20.005.30362 and earlier versions for Windows & macOS
  • Acrobat 2017 Classic 2017 17.012.30249 and earlier versions for Windows & macOS
  • Acrobat Reader 2017 Classic 2017 17.012.30249 and earlier versions for Windows & macOS

CVE-2022-35665 – Use After Free vulnerability leading to Arbitrary code execution

Severity: Critical

CVE-2022-35666 – Improper Input Validation vulnerability leading to Arbitrary code execution

Severity: Critical

CVE-2022-35667 – Out-of-bounds Write vulnerability leading to Arbitrary code execution

Severity: Critical

CVE-2022-35668 – Improper Input Validation vulnerability leading to Memory leak

Severity: Important

CVE-2022-35670 – Use After Free vulnerability leading to Memory leak

Severity: Important

CVE-2022-35671 – Out-of-bounds read vulnerability leading to Memory leak

Severity: Important

CVE-2022-35678 – Out-of-bounds read vulnerability leading to Memory leak

Severity: Important