First published: Wed Sep 06 2023(Updated: )
Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=17.011.30180<17.011.30190 | |
Adobe Acrobat Reader | >=20.001.30005<20.001.30020 | |
Adobe Acrobat Reader DC | >=15.007.20033<21.001.20135 | |
Adobe Acrobat Reader Notification Manager | >=17.011.30180<17.011.30190 | |
Adobe Acrobat Reader Notification Manager | >=20.001.30005<20.001.30020 | |
Adobe Acrobat Reader | >=15.007.20033<21.001.20135 | |
macOS | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-21088.
Acrobat Reader DC versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by this vulnerability.
The severity rating of CVE-2021-21088 is 7.8 (high).
An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user.
Yes, Adobe has released a security update to address this vulnerability. It is recommended to update to the latest version of Acrobat Reader DC.