The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-39379

CVE-2024-39379: Adobe Acrobat Information Disclosure Flaw

CVE-2024-39379 is an out-of-bounds read vulnerability in Adobe Acrobat for Edge that exposes sensitive memory and can bypass ASLR protections. This article covers technical details, affected versions, impact, and mitigation.

Updated: January 22, 2026

CVE-2024-39379 Overview

CVE-2024-39379 is an out-of-bounds read vulnerability affecting Adobe Acrobat for Edge versions 126.0.2592.81 and earlier. This memory disclosure flaw allows attackers to read sensitive memory beyond the intended buffer boundaries, potentially exposing information that could be leveraged to bypass security mitigations such as Address Space Layout Randomization (ASLR). Successful exploitation requires user interaction—specifically, the victim must open a maliciously crafted file.

Critical Impact

This vulnerability enables attackers to disclose sensitive memory contents, potentially bypassing ASLR and other memory protection mechanisms, which could facilitate further exploitation chains.

Affected Products

  • Adobe Acrobat for Microsoft Edge versions 126.0.2592.81 and earlier
  • Adobe Acrobat browser extension integrated with Edge

Discovery Timeline

  • July 31, 2024 - CVE-2024-39379 published to NVD
  • October 16, 2024 - Last updated in NVD database

Technical Details for CVE-2024-39379

Vulnerability Analysis

This vulnerability is classified as CWE-125 (Out-of-Bounds Read), a memory safety issue where the application reads data from a location outside the bounds of the intended buffer. In the context of Adobe Acrobat for Edge, the vulnerability occurs when processing specially crafted input files, allowing the application to access memory regions it should not have access to.

The out-of-bounds read condition enables an attacker to extract sensitive information from the application's memory space. This information disclosure is particularly dangerous because it can reveal memory addresses and layout information that would otherwise be randomized by ASLR. By obtaining this information, attackers can defeat ASLR protections, making subsequent exploitation attempts—such as code execution—significantly more reliable.

Root Cause

The root cause of CVE-2024-39379 lies in improper bounds checking within Adobe Acrobat's file parsing routines when integrated with Microsoft Edge. When the application processes certain malformed input, it fails to properly validate the length or boundaries of data being read, resulting in memory access beyond the allocated buffer. This boundary validation failure allows reads into adjacent memory regions containing potentially sensitive data.

Attack Vector

The attack vector for this vulnerability is local, requiring user interaction. An attacker must convince a victim to open a maliciously crafted file through Adobe Acrobat for Edge. This could be achieved through various social engineering techniques such as phishing emails with malicious PDF attachments, compromised websites hosting weaponized documents, or file-sharing platforms distributing the malicious content.

Once the victim opens the malicious file, the out-of-bounds read is triggered automatically during file parsing. The disclosed memory information can then be exfiltrated or used locally to prepare more sophisticated attacks that leverage the defeated ASLR protections.

Detection Methods for CVE-2024-39379

Indicators of Compromise

  • Unexpected memory access violations or crashes in Adobe Acrobat for Edge processes
  • Anomalous PDF files with malformed structures or unusual embedded objects targeting buffer parsing routines
  • Suspicious outbound network connections from Adobe Acrobat processes following document opening

Detection Strategies

  • Monitor for abnormal behavior in Adobe Acrobat for Edge processes, particularly memory access patterns during file parsing operations
  • Implement file integrity monitoring to detect and quarantine potentially malicious PDF documents before they reach end users
  • Deploy endpoint detection and response (EDR) solutions capable of identifying memory disclosure attack patterns

Monitoring Recommendations

  • Enable enhanced logging for Adobe Acrobat and Microsoft Edge browser extension activities
  • Configure security information and event management (SIEM) systems to alert on unusual document-related process behaviors
  • Monitor for indicators of ASLR bypass attempts or memory information leakage on protected endpoints

How to Mitigate CVE-2024-39379

Immediate Actions Required

  • Update Adobe Acrobat for Edge to a version newer than 126.0.2592.81 immediately
  • Educate users about the risks of opening untrusted PDF documents and files from unknown sources
  • Implement application whitelisting to restrict execution of potentially compromised components
  • Review and restrict permissions for Adobe Acrobat browser extensions where possible

Patch Information

Adobe and Microsoft have addressed this vulnerability in versions released after 126.0.2592.81. Administrators should consult the Microsoft Security Response Center advisory for detailed patch information and deployment guidance. Ensure automatic updates are enabled for Microsoft Edge and its extensions to receive security patches promptly.

Workarounds

  • Disable or remove the Adobe Acrobat for Edge extension until patching is complete
  • Configure PDF files to open in alternative, patched PDF readers rather than the integrated Acrobat extension
  • Implement network-level filtering to scan and sanitize PDF documents before delivery to end users
  • Enable Protected View or sandboxing features where available to limit the impact of potential exploitation

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechAdobe Acrobat

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-125
  • Vendor Resources
  • Microsoft CVE-2024-39379 Advisory
  • Related CVEs
  • CVE-2025-47112: Adobe Acrobat DC Information Disclosure

  • CVE-2025-27163: Adobe Acrobat Information Disclosure Flaw

  • CVE-2024-49532: Adobe Acrobat Information Disclosure Flaw

  • CVE-2021-40729: Adobe Acrobat DC Information Disclosure
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English