First published: Tue Aug 24 2021(Updated: )
Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat | >=15.008.20082<=21.001.20155 | |
Adobe Acrobat Reader | >=15.008.20082<=21.001.20155 | |
Apple iOS and macOS | ||
Microsoft Windows | ||
Adobe Acrobat Reader | >=17.011.30180<=17.011.30196 | |
Adobe Acrobat Reader | >=20.001.30005<=20.001.30025 | |
Adobe Acrobat Reader | >=17.011.30180<=17.011.30196 | |
Adobe Acrobat Reader | >=20.001.30005<=20.001.30025 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28632 is classified as a critical vulnerability due to its potential for arbitrary code execution.
To fix CVE-2021-28632, update Adobe Acrobat Reader DC to the latest version that addresses this vulnerability.
CVE-2021-28632 affects Acrobat Reader DC versions 2021.001.20155 and earlier, 2020.001.30025 and earlier, and 2017.011.30196 and earlier.
Yes, CVE-2021-28632 can lead to a security breach allowing attackers to execute arbitrary code.
Yes, an unauthenticated attacker can exploit CVE-2021-28632 for remote code execution.