Categories: SecurityWorkspace

Researchers Crack PDF Encryption

Researchers have found ways around the standard encryption built into the PDF format, which could allow attackers to extract data from supposedly secure documents.

The issues, which affect the vast majority of PDF readers, are found in the standard itself, making them more difficult to remedy, the researchers said.

The team of six academics from Ruhr-University Bochum and Münster University in Germany said the issues arise because of the fact that the PDF standard allows encrypted and unencrypted content to coexist within the same document, and because of limitations in an encryption method supported by the standard.

Because the standard allows PDFs to contain both encrypted and unencrypted content, an attacker could modify an encrypted document to add unencrypted malicious elements.

Encryption weakness

Those elements could be designed to transmit the contents of the PDF to the attacker via the internet once the document is decrypted by an authorised user, the researchers said.

“Encrypted PDF files do not have integrity protection,” they wrote in a technical document.  “Thus, an attacker can modify the structure of encrypted PDF documents, add unencrypted objects, or wrap encrypted parts into a context controlled the attacker.”

For instance, the attacker could define a PDF Action that automatically submits a form containing the encrypted content once the document is decrypted.

This attack could be executed without the user’s interaction or knowledge.

A second variant on the attack makes use of the fact that PDF standard encryption uses the Cipher Block Chaining (CBC) encryption mode with no integrity checks, allowing the ciphertext to be modified using CBC malleability gadgets.

The ciphertext is modified so that, as in the first variant, it automatically exfiltrates itself when the document is decrypted.

PDFex

While the first variant, called direct exfiltration, was found to work on 23 out of 27 tested PDF viewers, all of the viewers were vulnerable to the CBC gadget attack.

The researchers said they have contacted the relevant PDF viewer makers, which are releasing updates that fix the issues.

The researchers said future versions of the PDF standard must address the fact that encryption without integrity protection is still allowed.

The six researchers are to present their findings on the PDF exfiltration attacks, which they called PDFex for short, at the ACM Conference on Computer and Communications Security in November.

Some of the same researchers publicised vulnerabilities in PDF signatures in Feburary, and in May 2018 the group outlined an attack they called “eFail” that affects PGP-encrypted emails.

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Northvolt Mulls US Bankruptcy Protection – Report

Troubled battery maker Northvolt reportedly considers Chapter 11 bankruptcy protection in the United States as…

2 days ago

FTC Plans Investigation Into Microsoft Cloud Business – Report

Microsoft's cloud business practices are reportedly facing a potential anti-competitive investigation by the FTC

2 days ago

Programmer Sentenced To Five Years In Prison For Bitcoin Laundering

Ilya Lichtenstein sentenced to five years in prison for hacking into a virtual currency exchange…

2 days ago

Hate Speech Watchdog CCDH To Quit Musk’s X

Target for Elon Musk's lawsuit, hate speech watchdog CCDH, announces its decision to quit X…

3 days ago

Meta Fined €798m Over Alleged Facebook Marketplace Violations

Antitrust penalty. European Commission fines Meta a hefty €798m ($843m) for tying Facebook Marketplace to…

3 days ago

Elon Musk Rebuked By Italian President Over Migration Tweets

Elon Musk continues to provoke the ire of various leaders around the world with his…

3 days ago