Categories: SecurityWorkspace

Researchers Crack PDF Encryption

Researchers have found ways around the standard encryption built into the PDF format, which could allow attackers to extract data from supposedly secure documents.

The issues, which affect the vast majority of PDF readers, are found in the standard itself, making them more difficult to remedy, the researchers said.

The team of six academics from Ruhr-University Bochum and Münster University in Germany said the issues arise because of the fact that the PDF standard allows encrypted and unencrypted content to coexist within the same document, and because of limitations in an encryption method supported by the standard.

Because the standard allows PDFs to contain both encrypted and unencrypted content, an attacker could modify an encrypted document to add unencrypted malicious elements.

Encryption weakness

Those elements could be designed to transmit the contents of the PDF to the attacker via the internet once the document is decrypted by an authorised user, the researchers said.

“Encrypted PDF files do not have integrity protection,” they wrote in a technical document.  “Thus, an attacker can modify the structure of encrypted PDF documents, add unencrypted objects, or wrap encrypted parts into a context controlled the attacker.”

For instance, the attacker could define a PDF Action that automatically submits a form containing the encrypted content once the document is decrypted.

This attack could be executed without the user’s interaction or knowledge.

A second variant on the attack makes use of the fact that PDF standard encryption uses the Cipher Block Chaining (CBC) encryption mode with no integrity checks, allowing the ciphertext to be modified using CBC malleability gadgets.

The ciphertext is modified so that, as in the first variant, it automatically exfiltrates itself when the document is decrypted.

PDFex

While the first variant, called direct exfiltration, was found to work on 23 out of 27 tested PDF viewers, all of the viewers were vulnerable to the CBC gadget attack.

The researchers said they have contacted the relevant PDF viewer makers, which are releasing updates that fix the issues.

The researchers said future versions of the PDF standard must address the fact that encryption without integrity protection is still allowed.

The six researchers are to present their findings on the PDF exfiltration attacks, which they called PDFex for short, at the ACM Conference on Computer and Communications Security in November.

Some of the same researchers publicised vulnerabilities in PDF signatures in Feburary, and in May 2018 the group outlined an attack they called “eFail” that affects PGP-encrypted emails.

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

SoftBank Promises To Invest $100bn In US

Japanese tech investment firm SoftBank promises to invest $100bn during Trump's second term to create…

4 hours ago

Synopsys, SiMa.ai To Collaborate On AI Car Chips

Synopsys to work with start-up SiMa.ai on joint offering to help accelerate development of AI…

4 hours ago

AI Start-Up Basis Raises $34m For Accountancy Agent

Start-up Basis raises $34m in Series A funding round for AI-powered accountancy agent to make…

5 hours ago

Databricks Raises $10bn In Huge AI Funding Round

Data analytics and AI start-up Databricks completes huge $10bn round from major venture capitalists as…

5 hours ago

Congo Files Complaints Against Apple Over Conflict Minerals

Congo files legal complaints against Apple in France, Belgium alleging company 'complicit' in laundering conflict…

6 hours ago

EU Opens TikTok Probe Over Election Interference Claims

European Commission opens formal probe into TikTok after Romanian first-round elections annulled over Russian interference…

6 hours ago