8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.063 Low
EPSS
Percentile
93.5%
05/12/2020
Critical
Multiple vulnerabilities were found in in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Adobe Acrobat DC Continuous earlier than 2020.009.20063
Adobe Acrobat 2017 Classic earlier than 2017.011.30171
Adobe Acrobat 2015 Classic earlier than 2015.006.30523
Adobe Acrobat Reader DC Continuous earlier than 2020.009.20063
Adobe Acrobat Reader 2017 Classic earlier than 2017.011.30171
Adobe Acrobat Reader 2015 Classic earlier than 2015.006.30523
Update to the latest version
Download Adobe Acrobat Reader DC
ACE
Adobe Acrobat Reader DC Continuous
CVE-2020-95984.3Warning
CVE-2020-95934.3Warning
CVE-2020-96155.1High
CVE-2020-96136.8High
CVE-2020-96076.8High
CVE-2020-95954.3Warning
CVE-2020-96046.8High
CVE-2020-96024.3Warning
CVE-2020-96064.6Warning
CVE-2020-96034.3Warning
CVE-2020-95995.0Warning
CVE-2020-96114.3Warning
CVE-2020-95946.8High
CVE-2020-96146.8High
CVE-2020-96084.3Warning
CVE-2020-96104.3Warning
CVE-2020-95966.8High
CVE-2020-96015.0Warning
CVE-2020-96005.0Warning
CVE-2020-96056.8High
CVE-2020-95926.8High
CVE-2020-96094.3Warning
CVE-2020-95976.8High
CVE-2020-96126.8High
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9592
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9593
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9594
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9595
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9596
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9598
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9599
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9600
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9601
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9602
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9603
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9604
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9605
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9606
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9607
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9608
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9609
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9610
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9611
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9612
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9613
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9614
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9615
get.adobe.com/ru/reader/
helpx.adobe.com/security/products/acrobat/apsb20-24.html
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Adobe-Acrobat-2017/
threats.kaspersky.com/en/product/Adobe-Acrobat-DC-Classic/
threats.kaspersky.com/en/product/Adobe-Acrobat-DC-Continuous/
threats.kaspersky.com/en/product/Adobe-Acrobat-Reader-2017/
threats.kaspersky.com/en/product/Adobe-Acrobat-Reader-DC-Classic/
threats.kaspersky.com/en/product/Adobe-Acrobat-Reader-DC-Continuous/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.063 Low
EPSS
Percentile
93.5%