New 'Shadow Attack' can replace content in digitally signed PDF files

silversurfer

Super Moderator
Thread author
Verified
Top Poster
Staff Member
Malware Hunter
Forum Veteran
Aug 17, 2014
12,740
123,895
8,399
Fifteen out of 28 desktop PDF viewer applications are vulnerable to a new attack that lets malicious threat actors modify the content of digitally signed PDF documents.

The list of vulnerable applications includes Adobe Acrobat Pro, Adobe Acrobat Reader, Perfect PDF, Foxit Reader, PDFelement, and others, according to new research [PDF] published this week by academics from the Ruhr-University Bochum in Germany.
shadow-attack-results.png

Image: Mainka et al.
 
Last edited:
From the article:
PATCHES ARE AVAILABLE
The research team said they worked with the CERT-Bund (Computer Emergency Response Team of Germany) to contact PDF app makers to report this new attack vector and have it patched before going public with their findings earlier this week.

The Shadow Attack is currently tracked with the CVE-2020-9592 and CVE-2020-9596 identifiers.

Companies should update their PDF viewer apps to make sure the PDF documents they sign can't be tampered with via a Shadow Attack.
So, nothing to worry about if your pdf software is up to date?
 
nothing to worry about if your pdf software is up to date?
Concerns are users who use manual updates, blocked checking for updates, or using older versions because they don't want to pay for the newer releases. Both for consumers and businesses.


I don't see Chrome or Chromium-Edge PDF "app" on the list, browser PDFs are unaffected?
 
Was shortly debated also here.
CVE-2020-9592 and CVE-2020-9596 was patched in Adobe Reader in May this year 2020.
As previous, PDF readers that can't view digitally signed documents this probably ain't an issue.
 
Last edited:

You may also like...