Новости компьютерной безопасности:

  Latest News

Zero-Day Vulnerability in PDF Files Leaking NTLM Data in Adobe & Foxit Reader

С сайта: Vulnerability(cybersecuritynews.com)

Zero-Day Vulnerability in PDF Files Leaking NTLM Data in Adobe & Foxit Reader

Author: Balaji N

Cybersecurity researchers at EXPMON have uncovered an intriguing “zero-day behavior” in PDF samples that could potentially be exploited by attackers to leak sensitive NTLM authentication data.

The discovery highlights vulnerabilities in how Adobe Reader and Foxit Reader handle certain PDF actions, though researchers emphasize that no evidence suggests the behavior was created with malicious intent in the analyzed samples.

While examining PDF samples uploaded to VirusTotal (VT) years ago, EXPMON researchers identified a previously unknown behavior in the way PDFs execute actions defined within their code.

Specifically, the vulnerability arises from how specific /Launch actions are processed by Adobe Reader and Foxit Reader. If exploited by a malicious actor, these behaviors could enable the theft of NTLM information a key authentication mechanism in Windows networks.

One of the analyzed samples contained the following crucial code snippet:

5 0 obj > endobj
This code initiates a /Launch action designed to open a file or application. However, when processed by PDF readers in certain configurations, the behavior inadvertently triggers NTLM information leaks.

Vulnerability Analysis
Adobe Reader
When the PDF sample is opened in Adobe Reader, the application attempts to locate a network resource named “Applications.” If successful, it initiates a connection and sends NTLM credentials to the server even before the user sees a warning message.

While this behavior doesn’t allow attackers to use public domain names, they could exploit it in private network environments. By crafting a malicious PDF and using an attacker-controlled local server, bad actors could harvest sensitive NTLM information from victims.

Adobe, however, downplayed the risk, citing design choices that limit this behavior to intranet domains. According to their statement:

“DNS/NTLM calls are only made for intranet domains, not for internet domains. Acrobat considers intranet domains to be trusted when the ‘Automatically trust sites from Win OS security zones’ feature is enabled. This feature is enabled by default in Acrobat.”

Foxit Reader
The vulnerability manifests differently in Foxit Reader. While the original sample doesn’t trigger the NTLM leak, modifying the /F (file path) field to reference a public domain such as pub.expmon.com does. For example, this modified code can leak NTLM credentials to a public server controlled by an attacker:

5 0 obj > endobj
When victims open the modified PDF file, their NTLM credentials are sent to the attacker’s public server, even though a warning appears after the fact.

Unlike Adobe, Foxit acknowledged the security implications of this behavior and promptly issued a patch in December 2024.

Vendor Responses
Adobe Reader : Adobe determined the behavior was not a security issue, as it is limited to intranet domains only. They emphasized that this design decision aligns with their trust model for handling network resources.

Foxit Reader : Foxit Software treated the discovery as a legitimate vulnerability, releasing a patched version — Foxit PDF Reader for Windows v2024.4 to address the issue. They encouraged users to download the latest version and highlighted the fix in their security bulletins.

EXPMON’s findings underscore the potential risks of overlooked behaviors in widely used software.

While the identified “zero-day behavior” has not been actively exploited in the wild, it serves as a stark reminder of how easily these vulnerabilities could be weaponized.

EXPMON stressed that their discovery highlights the power of big data analytics (BDA) in identifying missed or unknown threats. By leveraging BDA, the team can retrospectively analyze files and improve exploit detection capabilities.

In a statement, EXPMON shared: “This finding is a good example of the power of BDA analysis and why EXPMON is capable of detecting the most undetected file-based zero-day exploits.”

  • For Adobe Reader Users:
    While Adobe has not released a patch for this behavior, users can mitigate risks by disabling the “Automatically trust sites from Win OS security zones” feature within Acrobat settings.
  • For Foxit Reader Users:
    Users should immediately update to Foxit Reader v2024.4 or higher to ensure protection against this vulnerability.



#Cyber_Security_News #Vulnerability #Vulnerability_News #Zero-Day #cyber_security #cyber_security_news #vulnerability

Оригинальная версия на сайте: Zero-Day Vulnerability in PDF Files Leaking NTLM Data in Adobe & Foxit Reader
Вернуться к списку новостей К свежим новостям Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.

Вернуться к списку новостей Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.


Новости проекта CSN:

✉ CSN.net4me.net

Обновление сайта csn.net4me.net

Обновление сайта csn.net4me.net 💻
cyber security news
  • Физически мы переехали на новый сервер. Благодарим наших подписчиков и постоянных читателей за терпение и понимание.
  • Сайт csn.net4me.net полностью адаптирован для работы по шифрованному SSL соединению.
  • Изменен механизм обработки и отображения опасных и критических уязвимостей.

Благодарим что вы с нами.


#CSN_обновление_сайта
https://csn.net4me.net/cyber_security_8301.html

Дополнительный материал

О проекте CSN

Проект CSN.net4me.net родился 16 Марта 2018 года.
Проект находится в самом начале своего развития. Конечно оформление, наполнение будет меняться. Одно останется неизменным - самые свежие новости компьютерной и сетевой безопасности.

О проекте net4me

Проект net4me.net развивался как сборник готовых решений и документации по темам компьютерной безопасности, сетевых решений и СПО (в часности linux). Темпы развития IT отрасли оказались столь быстрыми, что некоторые знания, технологии и информация о них устаревали мгновенно. Тем не менее, некоторый материал net4me.net до сих пор востребован.

Об источниках

Новости берутся CSN из открытых и доступных каждому источников. Авторы проекта стараются подбирать авторитетные и проверенные источники. Но, тем не менее, не несут ответственности за содержимое новостей. В каждой новости указывается источник этой новости, её автор и ссылка на оригинал новости.

Информация

Если вы желаете чтобы новости вашего ресурса были размещены на сайте CSN, то свяжитесь с авторами проекта csn@net4me.net и предложите ссылку на rss или xml ленту новостей вашего ресурса. Любая предложенная информация будет рассмотрена редакцией.