First published: Tue Feb 09 2021(Updated: )
Acrobat Pro DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use-after-free vulnerability when parsing a specially crafted PDF file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=17.0<=17.011.30188 | |
Adobe Acrobat Reader | >=20.0<=20.001.30018 | |
Adobe Acrobat Reader DC | <=20.013.20074 | |
Adobe Acrobat Reader Notification Manager | >=17.0<=17.011.30188 | |
Adobe Acrobat Reader Notification Manager | >=20.0<=20.001.300183 | |
Adobe Acrobat Reader | <=20.013.20074 | |
macOS | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21061 is classified as a critical severity vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2021-21061, update Adobe Acrobat Pro DC and Adobe Acrobat Reader to the latest versions, specifically versions after 2020.013.20074 for DC and 20.001.30018 or 17.011.30189 for Reader.
CVE-2021-21061 affects Adobe Acrobat Pro DC, Adobe Acrobat Reader, and their respective versions specified in the vulnerability details.
Yes, CVE-2021-21061 can be exploited remotely by an unauthenticated attacker through specially crafted PDF documents.
Exploiting CVE-2021-21061 can lead to code execution, allowing attackers to control the affected system.