Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-18689


The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, a Signature Wrapping vulnerability exists in multiple products. An attacker can use /ByteRange and xref manipulations that are not detected by the signature-validation logic. This affects Foxit Reader before 9.4 and PhantomPDF before 8.3.9 and 9.x before 9.4. It also affects eXpert PDF 12 Ultimate, Expert PDF Reader, Nitro Pro, Nitro Reader, PDF Architect 6, PDF Editor 6 Pro, PDF Experte 9 Ultimate, PDFelement6 Pro, PDF Studio Viewer 2018, PDF Studio Pro, PDF-XChange Editor and Viewer, Perfect PDF 10 Premium, Perfect PDF Reader, Soda PDF, and Soda PDF Desktop.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 5.3, indicating it can be exploited remotely over the network with relatively low complexity without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts limited data confidentiality, for affected systems. Impacting 20 products from avanquest, from avanquest, from foxitsoftware and 17 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2021, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2021-01-07T18:15:12.560

Last Modified

2024-11-27T20:11:45.410

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-347

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application avanquest expert_pdf_ultimate 12.0.20 Yes
Application avanquest pdf_experte_ultimate 9.0.270 Yes
Application foxitsoftware foxit_reader 9.1.0 Yes
Application foxitsoftware foxit_reader 9.2.0.9297 Yes
Application foxitsoftware foxit_reader 9.3.0.10826 Yes
Application gonitro nitro_pro 11.0.3.173 Yes
Application gonitro nitro_reader 5.5.9.2 Yes
Application iskysoft pdf_editor_6 6.4.2.3521 Yes
Application iskysoft pdfelement6 6.8.0.3523 Yes
Application iskysoft pdfelement6 6.8.4.3921 Yes
Application pdf-xchange pdf-xchange_editor 7.0.237.1 Yes
Application pdf-xchange pdf-xchange_editor 7.0.326 Yes
Application pdfforge pdf_architect 6.0.37 Yes
Application pdfforge pdf_architect 6.1.24.1862 Yes
Application qoppa pdf_studio 12.0.7 Yes
Application qoppa pdf_studio_viewer_2018 2018.0.1 Yes
Application qoppa pdf_studio_viewer_2018 2018.2.0 Yes
Application sodapdf soda_pdf 9.3.17 Yes
Application sodapdf soda_pdf_desktop 10.2.09 Yes
Application sodapdf soda_pdf_desktop 10.2.16.1217 Yes
Application soft-xpansion perfect_pdf_10 10.0.0.1 Yes
Application soft-xpansion perfect_pdf_reader 13.0.3 Yes
Application soft-xpansion perfect_pdf_reader 13.1.5 Yes
Application tracker-software pdf-xchange_viewer 2.5 Yes
Application visagesoft expert_pdf_reader 9.0.180 Yes
Operating System microsoft windows - No
Application foxitsoftware foxit_reader 9.1.0 Yes
Application foxitsoftware foxit_reader 9.2.0 Yes
Application iskysoft pdf_editor_6 6.6.2.3315 Yes
Application iskysoft pdf_editor_6 6.7.6.3399 Yes
Application iskysoft pdfelement6 6.7.1.3355 Yes
Application iskysoft pdfelement6 6.7.6.3399 Yes
Application qoppa pdf_studio 12.0.7 Yes
Application qoppa pdf_studio_viewer_2018 2018.0.1 Yes
Application qoppa pdf_studio_viewer_2018 2018.2.0 Yes
Operating System apple macos - No
Application foxitsoftware foxit_reader 9.1.0 Yes
Application foxitsoftware foxit_reader 9.2.0 Yes
Application qoppa pdf_studio 12.0.7 Yes
Application qoppa pdf_studio_viewer_2018 2018.0.1 Yes
Application qoppa pdf_studio_viewer_2018 2018.2.0 Yes
Operating System linux linux_kernel - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For avanquest's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.