First published: Tue Jun 08 2021(Updated: )
Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat | >=15.008.20082<=21.001.20155 | |
Adobe Acrobat Reader | >=15.008.20082<=21.001.20155 | |
Apple iOS and macOS | ||
Microsoft Windows | ||
Adobe Acrobat Reader | >=17.011.30180<=17.011.30196 | |
Adobe Acrobat Reader | >=20.001.30005<=20.001.30025 | |
Adobe Acrobat Reader | >=17.011.30180<=17.011.30196 | |
Adobe Acrobat Reader | >=20.001.30005<=20.001.30025 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28552 is classified as a critical vulnerability due to its potential for arbitrary code execution.
To fix CVE-2021-28552, users should update their Adobe Acrobat Reader DC to version 21.001.20156 or later.
CVE-2021-28552 affects Adobe Acrobat DC, including versions 2021.001.20155 and earlier, 2020.001.30025 and earlier, and 2017.011.30196 and earlier.
Yes, CVE-2021-28552 can be exploited by unauthenticated attackers, potentially leading to remote code execution.
If you are using a vulnerable version related to CVE-2021-28552, you should immediately update to the latest version provided by Adobe.