Unknown
CVE-2018-18689
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2018-18689
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, a Signature Wrapping vulnerability exists in multiple products. An attacker can use /ByteRange and xref manipulations that are not detected by the signature-validation logic. This affects Foxit Reader before 9.4 and PhantomPDF before 8.3.9 and 9.x before 9.4. It also affects eXpert PDF 12 Ultimate, Expert PDF Reader, Nitro Pro, Nitro Reader, PDF Architect 6, PDF Editor 6 Pro, PDF Experte 9 Ultimate, PDFelement6 Pro, PDF Studio Viewer 2018, PDF Studio Pro, PDF-XChange Editor and Viewer, Perfect PDF 10 Premium, Perfect PDF Reader, Soda PDF, and Soda PDF Desktop.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- avanquest,
- foxitsoftware,
- gonitro,
- iskysoft,
- pdf-xchange,
- pdfforge,
- qoppa,
- sodapdf,
- soft-xpansion,
- tracker-software,
- visagesoft
Products
- expert pdf reader 9.0.180,
- expert pdf ultimate 12.0.20,
- foxit reader 9.1.0,
- foxit reader 9.2.0,
- foxit reader 9.2.0.9297,
- foxit reader 9.3.0.10826,
- nitro pro 11.0.3.173,
- nitro reader 5.5.9.2,
- pdf architect 6.0.37,
- pdf architect 6.1.24.1862,
- pdf editor 6 6.4.2.3521,
- pdf editor 6 6.6.2.3315,
- pdf editor 6 6.7.6.3399,
- pdf experte ultimate 9.0.270,
- pdf studio 12.0.7,
- pdf studio viewer 2018 2018.0.1,
- pdf studio viewer 2018 2018.2.0,
- pdf-xchange editor 7.0.237.1,
- pdf-xchange editor 7.0.326,
- pdf-xchange viewer 2.5,
- pdfelement6 6.7.1.3355,
- pdfelement6 6.7.6.3399,
- pdfelement6 6.8.0.3523,
- pdfelement6 6.8.4.3921,
- perfect pdf 10 10.0.0.1,
- perfect pdf reader 13.0.3,
- perfect pdf reader 13.1.5,
- soda pdf 9.3.17,
- soda pdf desktop 10.2.09,
- soda pdf desktop 10.2.16.1217
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: