Security Experts:

Connect with us

Hi, what are you looking for?



Hackers Can Target Able2Extract Users With Malicious Image Files

Serious vulnerabilities found by researchers in Investintech’s Able2Extract Professional tool can be exploited by hackers to execute arbitrary code using specially crafted image files.

Serious vulnerabilities found by researchers in Investintech’s Able2Extract Professional tool can be exploited by hackers to execute arbitrary code using specially crafted image files.

According to Investintech, Able2Extract Professional has over 250,000 licensed users across 135 countries, including in 90% of Fortune 100 companies. The cross-platform tool allows users to view, convert and edit PDF files.

Researchers at Cisco Talos discovered that Able2Extract Professional is affected by two high-severity memory corruption vulnerabilities that can be leveraged to execute arbitrary code on the targeted machine.

The flaws, tracked as CVE-2019-5088 and CVE-2019-5089, can be exploited using specially crafted JPEG or BMP image files that trigger an out-of-bounds memory write. If an attacker can convince the targeted user to open such a file using Able2Extract Professional, they can execute code on the victim’s machine.

Cisco Talos said it reported the vulnerabilities to Investintech in early August and a patch was released on November 1, but it’s unclear which version includes the fix. Talos has reproduced the vulnerabilities on version 14.0.7 x64.

Talos has made available technical details for both vulnerabilities. These types of security holes could be highly useful to attackers given Able2Extract Professional’s large user base.

Able2Extract is not the only PDF tool in which Talos researchers have found vulnerabilities. They have also identified serious flaws in products from Aspose and Foxit.

Related: AMD Radeon Driver Flaw Leads to VM Escape

Related: Hard-Coded Credentials Found in Alpine Linux Docker Images

Related: Cisco Finds 11 Vulnerabilities in Schneider Electric Modicon Controllers

Related: Remote Code Execution Flaws Impact Aspose APIs

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.


GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet