First published: Wed Sep 06 2023(Updated: )
Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=17.011.30180<17.011.30190 | |
Adobe Acrobat Reader | >=20.001.30005<20.001.30020 | |
Adobe Acrobat Dc | >=15.007.20033<21.001.20135 | |
Adobe Acrobat Reader | >=17.011.30180<17.011.30190 | |
Adobe Acrobat Reader | >=20.001.30005<20.001.30020 | |
Adobe Acrobat Reader DC | >=15.007.20033<21.001.20135 | |
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-21088.
Acrobat Reader DC versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by this vulnerability.
The severity rating of CVE-2021-21088 is 7.8 (high).
An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user.
Yes, Adobe has released a security update to address this vulnerability. It is recommended to update to the latest version of Acrobat Reader DC.