CVE-2022-35691: NULL Pointer Dereference (CWE-476) in Adobe Acrobat Reader
Adobe Acrobat Reader versions 22.002.20212 (and earlier) and 20.005.30381 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
AI Analysis
Technical Summary
CVE-2022-35691 is a vulnerability identified in Adobe Acrobat Reader versions 22.002.20212 and earlier, as well as 20.005.30381 and earlier. The issue is classified as a NULL Pointer Dereference (CWE-476), which occurs when the application attempts to read or write to a memory location through a pointer that has not been properly initialized or has been set to NULL. This results in an application crash, leading to a denial-of-service (DoS) condition within the context of the current user. The vulnerability can be exploited by an unauthenticated attacker but requires user interaction, specifically the victim opening a maliciously crafted PDF file. Upon opening such a file, the Acrobat Reader process may crash, disrupting the user's ability to use the application until it is restarted. There are no known exploits in the wild at the time of this analysis, and no official patches have been linked or released yet. The vulnerability does not allow for code execution or privilege escalation but impacts availability by causing application instability. The attack surface is limited to users who open malicious PDF documents, which is a common vector for social engineering attacks. Given the widespread use of Adobe Acrobat Reader in both personal and enterprise environments, this vulnerability poses a moderate risk primarily through disruption rather than data compromise or system takeover.
Potential Impact
For European organizations, the primary impact of CVE-2022-35691 is the potential disruption of business operations due to application crashes when users open malicious PDF files. This can affect productivity, especially in sectors heavily reliant on PDF documents for daily workflows such as legal, finance, government, and education. While the vulnerability does not directly compromise confidentiality or integrity, repeated denial-of-service conditions could lead to operational delays and increased support costs. Additionally, attackers could leverage this vulnerability as part of a broader social engineering campaign to cause targeted disruption. Organizations with strict uptime requirements or those using automated PDF processing systems may experience more significant operational impacts. Since exploitation requires user interaction, the risk is mitigated somewhat by user awareness, but phishing campaigns remain a viable attack vector. The lack of known exploits reduces immediate threat levels, but the vulnerability should be addressed promptly to prevent potential future abuse.
Mitigation Recommendations
1. Implement strict email and web filtering to block or quarantine suspicious PDF attachments, reducing the likelihood of users opening malicious files. 2. Educate users to be cautious when opening PDF files from unknown or untrusted sources, emphasizing the risk of denial-of-service and other attacks. 3. Deploy application whitelisting or sandboxing techniques for Acrobat Reader to isolate crashes and prevent broader system impact. 4. Monitor Acrobat Reader processes for abnormal termination patterns that may indicate exploitation attempts, enabling rapid incident response. 5. Maintain up-to-date backups and ensure business continuity plans account for potential application downtime. 6. Regularly check Adobe’s security advisories and apply patches promptly once available to remediate the vulnerability. 7. Consider alternative PDF readers with a lower risk profile or enhanced security features in high-risk environments. 8. Use endpoint detection and response (EDR) tools to detect anomalous behavior related to PDF file handling. These measures go beyond generic advice by focusing on reducing attack surface through filtering, user training, process monitoring, and proactive incident readiness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2022-35691: NULL Pointer Dereference (CWE-476) in Adobe Acrobat Reader
Description
Adobe Acrobat Reader versions 22.002.20212 (and earlier) and 20.005.30381 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
AI-Powered Analysis
Technical Analysis
CVE-2022-35691 is a vulnerability identified in Adobe Acrobat Reader versions 22.002.20212 and earlier, as well as 20.005.30381 and earlier. The issue is classified as a NULL Pointer Dereference (CWE-476), which occurs when the application attempts to read or write to a memory location through a pointer that has not been properly initialized or has been set to NULL. This results in an application crash, leading to a denial-of-service (DoS) condition within the context of the current user. The vulnerability can be exploited by an unauthenticated attacker but requires user interaction, specifically the victim opening a maliciously crafted PDF file. Upon opening such a file, the Acrobat Reader process may crash, disrupting the user's ability to use the application until it is restarted. There are no known exploits in the wild at the time of this analysis, and no official patches have been linked or released yet. The vulnerability does not allow for code execution or privilege escalation but impacts availability by causing application instability. The attack surface is limited to users who open malicious PDF documents, which is a common vector for social engineering attacks. Given the widespread use of Adobe Acrobat Reader in both personal and enterprise environments, this vulnerability poses a moderate risk primarily through disruption rather than data compromise or system takeover.
Potential Impact
For European organizations, the primary impact of CVE-2022-35691 is the potential disruption of business operations due to application crashes when users open malicious PDF files. This can affect productivity, especially in sectors heavily reliant on PDF documents for daily workflows such as legal, finance, government, and education. While the vulnerability does not directly compromise confidentiality or integrity, repeated denial-of-service conditions could lead to operational delays and increased support costs. Additionally, attackers could leverage this vulnerability as part of a broader social engineering campaign to cause targeted disruption. Organizations with strict uptime requirements or those using automated PDF processing systems may experience more significant operational impacts. Since exploitation requires user interaction, the risk is mitigated somewhat by user awareness, but phishing campaigns remain a viable attack vector. The lack of known exploits reduces immediate threat levels, but the vulnerability should be addressed promptly to prevent potential future abuse.
Mitigation Recommendations
1. Implement strict email and web filtering to block or quarantine suspicious PDF attachments, reducing the likelihood of users opening malicious files. 2. Educate users to be cautious when opening PDF files from unknown or untrusted sources, emphasizing the risk of denial-of-service and other attacks. 3. Deploy application whitelisting or sandboxing techniques for Acrobat Reader to isolate crashes and prevent broader system impact. 4. Monitor Acrobat Reader processes for abnormal termination patterns that may indicate exploitation attempts, enabling rapid incident response. 5. Maintain up-to-date backups and ensure business continuity plans account for potential application downtime. 6. Regularly check Adobe’s security advisories and apply patches promptly once available to remediate the vulnerability. 7. Consider alternative PDF readers with a lower risk profile or enhanced security features in high-risk environments. 8. Use endpoint detection and response (EDR) tools to detect anomalous behavior related to PDF file handling. These measures go beyond generic advice by focusing on reducing attack surface through filtering, user training, process monitoring, and proactive incident readiness.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- adobe
- Date Reserved
- 2022-07-12T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf44f7
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 4:50:22 PM
Last updated: 8/1/2025, 4:25:28 AM
Views: 12
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.