{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T13:15:04.593","vulnerabilities":[{"cve":{"id":"CVE-2024-39420","sourceIdentifier":"psirt@adobe.com","published":"2024-08-14T15:15:24.960","lastModified":"2024-11-21T09:27:39.373","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Acrobat Reader versions 20.005.30636, 24.002.21005, 24.001.30159, 20.005.30655, 24.002.20965, 24.002.20964, 24.001.30123, 24.003.20054 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could lead to arbitrary code execution. This vulnerability arises when the timing of actions changes the state of a resource between the checking of a condition and the use of the resource, allowing an attacker to manipulate the resource in a harmful way. Exploitation of this issue requires user interaction in that a victim must open a malicious file."},{"lang":"es","value":" Las versiones de Acrobat Reader 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 y anteriores se ven afectadas por una vulnerabilidad de condición de ejecución de Time-of-check Time-of-use (TOCTOU) que podría resultar en la ejecución de código arbitrario en el contexto. del usuario actual. Este problema ocurre cuando el estado de un recurso cambia entre su tiempo de verificación y su tiempo de uso, lo que permite a un atacante manipular el recurso. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso."}],"metrics":{"cvssMetricV31":[{"source":"psirt@adobe.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@adobe.com","type":"Secondary","description":[{"lang":"en","value":"CWE-367"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*","versionStartIncluding":"20.001.30005","versionEndExcluding":"20.005.30655","matchCriteriaId":"B9311FEC-D9CC-421C-8E5E-8131E460FC42"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*","versionStartIncluding":"24.001.20604","versionEndExcluding":"24.001.30159","matchCriteriaId":"1A09E4B8-DB3B-45EC-B441-2C9549D299B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*","versionStartIncluding":"15.008.20082","versionEndExcluding":"24.002.21005","matchCriteriaId":"D555A6CB-9EDF-4CA2-B8E5-04A9D212FD8B"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*","versionStartIncluding":"20.001.3005","versionEndExcluding":"20.005.30655","matchCriteriaId":"883444C8-35EB-4BDF-A14C-C4C5BF97239A"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*","versionStartIncluding":"15.008.20082","versionEndExcluding":"24.002.21005","matchCriteriaId":"9CE03784-4780-4313-A27A-37B265BF3F9D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","matchCriteriaId":"387021A0-AF36-463C-A605-32EA7DAC172E"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"https://helpx.adobe.com/security/products/acrobat/apsb24-70.html","source":"psirt@adobe.com"},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2011","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}