CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
95.4%
The version of Adobe Acrobat installed on the remote macOS host is a version prior to 2017.011.30202, 2020.004.30015, or 2021.007.20091. It is, therefore, affected by multiple vulnerabilities.
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Type Confusion vulnerability. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39841)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted PDF file.
An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39863)
Adobe Acrobat Reader DC add-on for Internet Explorer versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to check for existence of local files.
Exploitation of this issue requires user interaction in that a victim must visit an attacker controlled web page. (CVE-2021-39857)
Acrobat Reader DC ActiveX Control versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must visit an attacker controlled web page. (CVE-2021-39856)
Acrobat Reader DC ActiveX Control versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must open a maliciously crafted Microsoft Office file, or visit an attacker controlled web page. (CVE-2021-39855)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39844, CVE-2021-39858, CVE-2021-39861)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39843)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted PDF file, potentially resulting in memory corruption in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted PDF file in Acrobat Reader. (CVE-2021-39845, CVE-2021-39846)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Uncontrolled Search Path Element vulnerability. A local attacker with non-administrative privileges can plant a malicious DLL to achieve arbitrary code execution in the context of the current user via DLL hijacking. Exploitation of this issue requires user interaction.
(CVE-2021-35982)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39859)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability when processing AcroForms that could result in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
(CVE-2021-39840)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39842)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm getItem action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39839)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm buttonGetCaption action that could result in arbitrary code execution in the context of the current user.
Exploitation of this issue requires user interaction in that a victim must open a malicious file.
(CVE-2021-39838)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm deleteItemAt action that could result in arbitrary code execution in the context of the current user.
Exploitation of this issue requires user interaction in that a victim must open a malicious file.
(CVE-2021-39837)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm buttonGetIcon action that could result in arbitrary code execution in the context of the current user.
Exploitation of this issue requires user interaction in that a victim must open a malicious file.
(CVE-2021-39836)
Acrobat Pro DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to disclose sensitive user memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39860)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
(CVE-2021-39849, CVE-2021-39850, CVE-2021-39851, CVE-2021-39852, CVE-2021-39853, CVE-2021-39854)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability when processing AcroForm listbox that could result in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
(CVE-2021-40725)
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability when processing AcroForm field that could result in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
(CVE-2021-40726)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(153362);
script_version("1.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/09/12");
script_cve_id(
"CVE-2021-35982",
"CVE-2021-39836",
"CVE-2021-39837",
"CVE-2021-39838",
"CVE-2021-39839",
"CVE-2021-39840",
"CVE-2021-39841",
"CVE-2021-39842",
"CVE-2021-39843",
"CVE-2021-39844",
"CVE-2021-39845",
"CVE-2021-39846",
"CVE-2021-39849",
"CVE-2021-39850",
"CVE-2021-39851",
"CVE-2021-39852",
"CVE-2021-39853",
"CVE-2021-39854",
"CVE-2021-39855",
"CVE-2021-39856",
"CVE-2021-39857",
"CVE-2021-39858",
"CVE-2021-39859",
"CVE-2021-39860",
"CVE-2021-39861",
"CVE-2021-39863",
"CVE-2021-40725",
"CVE-2021-40726"
);
script_xref(name:"IAVA", value:"2021-A-0415-S");
script_name(english:"Adobe Acrobat < 2017.011.30202 / 2020.004.30015 / 2021.007.20091 Multiple Vulnerabilities (APSB21-55) (macOS)");
script_set_attribute(attribute:"synopsis", value:
"The version of Adobe Acrobat installed on the remote macOS host is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Adobe Acrobat installed on the remote macOS host is a version prior to 2017.011.30202, 2020.004.30015, or
2021.007.20091. It is, therefore, affected by multiple vulnerabilities.
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by a Type Confusion vulnerability. An attacker could leverage this
vulnerability to execute arbitrary code in the context of the current user. Exploitation of this issue
requires user interaction in that a victim must open a malicious file. (CVE-2021-39841)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted PDF file.
An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the
context of the current user. Exploitation of this issue requires user interaction in that a victim must
open a malicious file. (CVE-2021-39863)
- Adobe Acrobat Reader DC add-on for Internet Explorer versions 2021.005.20060 (and earlier), 2020.004.30006
(and earlier) and 2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An
unauthenticated attacker could leverage this vulnerability to check for existence of local files.
Exploitation of this issue requires user interaction in that a victim must visit an attacker controlled
web page. (CVE-2021-39857)
- Acrobat Reader DC ActiveX Control versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and
2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated
attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue
requires user interaction in that a victim must visit an attacker controlled web page. (CVE-2021-39856)
- Acrobat Reader DC ActiveX Control versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and
2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated
attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue
requires user interaction in that a victim must open a maliciously crafted Microsoft Office file, or visit
an attacker controlled web page. (CVE-2021-39855)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of
arbitrary memory information in the context of the current user. Exploitation of this issue requires user
interaction in that a victim must open a malicious file. (CVE-2021-39844, CVE-2021-39858, CVE-2021-39861)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code
execution in the context of the current user. Exploitation of this issue requires user interaction in that
a victim must open a malicious file. (CVE-2021-39843)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted PDF
file, potentially resulting in memory corruption in the context of the current user. Exploitation requires
user interaction in that a victim must open a crafted PDF file in Acrobat Reader. (CVE-2021-39845,
CVE-2021-39846)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by an Uncontrolled Search Path Element vulnerability. A local attacker with
non-administrative privileges can plant a malicious DLL to achieve arbitrary code execution in the context
of the current user via DLL hijacking. Exploitation of this issue requires user interaction.
(CVE-2021-35982)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive
memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of
this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39859)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by a use-after-free vulnerability when processing AcroForms that could result
in arbitrary code execution in the context of the current user. User interaction is required to exploit
this vulnerability in that the target must visit a malicious page or open a malicious file.
(CVE-2021-39840)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution
in the context of the current user. Exploitation of this issue requires user interaction in that a victim
must open a malicious file. (CVE-2021-39842)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm getItem
action that could result in arbitrary code execution in the context of the current user. Exploitation of
this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39839)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm
buttonGetCaption action that could result in arbitrary code execution in the context of the current user.
Exploitation of this issue requires user interaction in that a victim must open a malicious file.
(CVE-2021-39838)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm
deleteItemAt action that could result in arbitrary code execution in the context of the current user.
Exploitation of this issue requires user interaction in that a victim must open a malicious file.
(CVE-2021-39837)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm
buttonGetIcon action that could result in arbitrary code execution in the context of the current user.
Exploitation of this issue requires user interaction in that a victim must open a malicious file.
(CVE-2021-39836)
- Acrobat Pro DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and
earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could
leverage this vulnerability to disclose sensitive user memory. Exploitation of this issue requires user
interaction in that a victim must open a malicious file. (CVE-2021-39860)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could
leverage this vulnerability to achieve an application denial-of-service in the context of the current
user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
(CVE-2021-39849, CVE-2021-39850, CVE-2021-39851, CVE-2021-39852, CVE-2021-39853, CVE-2021-39854)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by a use-after-free vulnerability when processing AcroForm listbox that could
result in arbitrary code execution in the context of the current user. User interaction is required to
exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
(CVE-2021-40725)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199
(and earlier) are affected by a use-after-free vulnerability when processing AcroForm field that could
result in arbitrary code execution in the context of the current user. User interaction is required to
exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
(CVE-2021-40726)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://helpx.adobe.com/security/products/acrobat/apsb21-55.html");
script_set_attribute(attribute:"solution", value:
"Upgrade to Adobe Acrobat version 2017.011.30202 / 2020.004.30015 / 2021.007.20091 or later.");
script_set_attribute(attribute:"agent", value:"unix");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-40726");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2021-39863");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(121, 122, 125, 200, 416, 427, 476, 787, 843);
script_set_attribute(attribute:"vuln_publication_date", value:"2021/09/14");
script_set_attribute(attribute:"patch_publication_date", value:"2021/09/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2021/09/14");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:acrobat");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"MacOS X Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2021-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("macosx_adobe_acrobat_installed.nbin");
script_require_keys("Host/local_checks_enabled", "Host/MacOSX/Version", "installed_sw/Adobe Acrobat");
exit(0);
}
include('vcf_extras.inc');
get_kb_item_or_exit('Host/local_checks_enabled');
os = get_kb_item('Host/MacOSX/Version');
if (empty_or_null(os)) audit(AUDIT_OS_NOT, 'Mac OS X');
var app_info = vcf::get_app_info(app:'Adobe Acrobat');
# vcf::adobe_reader::check_version_and_report will
# properly separate tracks when checking constraints.
# x.y.30zzz = DC Classic
# x.y.20zzz = DC Continuous
var constraints = [
{ 'min_version' : '17.8', 'max_version' : '17.011.30199', 'fixed_version' : '17.011.30202', 'track' : 'DC Classic' },
{ 'min_version' : '20.1', 'max_version' : '20.004.30006', 'fixed_version' : '20.004.30015', 'track' : 'DC Classic' },
{ 'min_version' : '15.7', 'max_version' : '21.005.20058', 'fixed_version' : '21.007.20091', 'track' : 'DC Continuous' }
];
vcf::adobe_acrobat::check_version_and_report(
app_info:app_info,
constraints:constraints,
max_segs:3,
severity:SECURITY_WARNING
);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35982
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39836
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39837
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39838
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39839
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39840
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39841
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39842
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39843
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39844
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39845
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39846
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39849
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39850
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39851
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39852
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39853
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39854
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39855
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39856
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39857
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39858
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39859
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39860
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39861
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39863
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40725
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40726
helpx.adobe.com/security/products/acrobat/apsb21-55.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
95.4%