First published: Tue Aug 24 2021(Updated: )
Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat | >=15.008.20082<=21.001.20155 | |
Adobe Acrobat Reader | >=15.008.20082<=21.001.20155 | |
Apple iOS and macOS | ||
Microsoft Windows | ||
Adobe Acrobat Reader | >=17.011.30180<=17.011.30196 | |
Adobe Acrobat Reader | >=20.001.30005<=20.001.30025 | |
Adobe Acrobat Reader | >=17.011.30180<=17.011.30196 | |
Adobe Acrobat Reader | >=20.001.30005<=20.001.30025 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28631 has been classified as a critical vulnerability due to its potential for arbitrary code execution.
To remediate CVE-2021-28631, users should update Adobe Acrobat Reader DC to the latest version available from Adobe.
CVE-2021-28631 affects Adobe Acrobat Reader DC versions up to 21.001.20155, 2020.001.30025, and 2017.011.30196.
Yes, CVE-2021-28631 can be exploited by unauthenticated attackers to execute arbitrary code remotely.
CVE-2021-28631 primarily impacts Adobe Acrobat Reader on both Windows and macOS platforms.