CVE-2025-43578
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-10

Last updated on: 2025-06-27

Assigner: Adobe Systems Incorporated

Description
Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-10
Last Modified
2025-06-27
Generated
2026-05-07
AI Q&A
2025-06-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 11 associated CPEs
Vendor Product Version / Range
adobe acrobat_dc From 15.008.20082 (inc) to 25.001.20531 (exc)
adobe acrobat_reader_dc From 15.008.20082 (inc) to 25.001.20531 (exc)
microsoft windows *
adobe acrobat_dc From 15.008.20082 (inc) to 25.001.20529 (exc)
adobe acrobat_reader_dc From 15.008.20082 (inc) to 25.001.20529 (exc)
apple macos *
adobe acrobat From 20.001.30002 (inc) to 20.005.30774 (exc)
adobe acrobat From 24.0.0 (inc) to 24.001.30254 (exc)
adobe acrobat_reader From 20.001.30002 (inc) to 20.005.30774 (exc)
apple macos *
microsoft windows *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an out-of-bounds read in certain versions of Acrobat Reader (24.001.30235, 20.005.30763, 25.001.20521 and earlier). It allows an attacker to read memory outside the intended boundaries, potentially disclosing sensitive information. Exploiting this requires the victim to open a malicious file, and it can bypass security mitigations like ASLR.


How can this vulnerability impact me? :

The vulnerability can lead to disclosure of sensitive memory, which means an attacker could gain access to confidential information stored in memory. This could compromise data confidentiality without affecting integrity or availability. Exploitation requires user interaction by opening a malicious file.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart