First published: Tue May 11 2021(Updated: )
Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by an Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat | >=15.008.20082<=21.001.20150 | |
Adobe Acrobat Reader | >=15.008.20082<=21.001.20150 | |
Microsoft Windows | ||
Adobe Acrobat Reader | >=17.011.30059<=17.011.30194 | |
Adobe Acrobat Reader | >=20.001.30005<=20.001.30020 | |
Adobe Acrobat Reader | >=17.011.30059<=17.011.30194 | |
Adobe Acrobat Reader | >=20.001.30005<=20.001.30020 | |
Apple iOS and macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28553 has been rated as critical due to its potential to allow arbitrary code execution.
CVE-2021-28553 affects Adobe Acrobat Reader DC versions 2021.001.20150 and earlier, 2020.001.30020 and earlier, and 2017.011.30194 and earlier.
To fix CVE-2021-28553, you should update Adobe Acrobat Reader DC to the latest version provided by Adobe.
Yes, CVE-2021-28553 can be exploited by unauthenticated attackers to execute arbitrary code remotely.
Exploiting CVE-2021-28553 can lead to unauthorized access and control over the affected system, compromising data integrity and confidentiality.