First published: Tue Feb 09 2021(Updated: )
Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker could leverage this vulnerability to modify content in a certified PDF without invalidating the certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=17.011.30059<=17.011.30188 | |
Adobe Acrobat Reader | >=20.001.30005<=20.001.30018 | |
Adobe Acrobat | >=15.008.20082<=20.013.20074 | |
Adobe Acrobat Reader | >=17.011.30059<=17.011.30188 | |
Adobe Acrobat Reader | >=20.001.30005<=20.001.30018 | |
Adobe Acrobat Reader | >=15.008.20082<=20.013.20074 | |
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28546 has been rated as important due to the potential impact on the integrity of PDF documents.
To mitigate CVE-2021-28546, update Adobe Acrobat Reader DC to the latest version available.
CVE-2021-28546 affects specific versions of Adobe Acrobat Reader DC, Adobe Acrobat, and Adobe Acrobat Reader.
Yes, an unauthenticated attacker can exploit CVE-2021-28546 to modify content in a certified PDF.
CVE-2021-28546 is missing support for an integrity check, allowing modifications without invalidating the document.