First published: Tue Sep 14 2021(Updated: )
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Uncontrolled Search Path Element vulnerability. A local attacker with non-administrative privileges can plant a malicious DLL to achieve arbitrary code execution in the context of the current user via DLL hijacking. Exploitation of this issue requires user interaction.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat | >=20.006.20034<=21.005.20060 | |
Microsoft Windows | ||
Adobe Acrobat | >=20.006.20034<=21.005.20058 | |
Apple iOS and macOS | ||
Adobe Acrobat Reader | >=20.006.20034<=21.005.20060 | |
Adobe Acrobat | >=20.004.30005<=20.004.30006 | |
Adobe Acrobat Reader | >=20.004.30005<=20.004.30006 | |
Adobe Acrobat | >=17.011.30158<=17.011.30199 | |
Adobe Acrobat Reader | >=17.011.30158<=17.011.30199 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35982 is classified as a high-severity vulnerability due to its potential for arbitrary code execution.
To mitigate CVE-2021-35982, users should update Adobe Acrobat Reader DC to the latest version that is not affected by this vulnerability.
CVE-2021-35982 affects Adobe Acrobat Reader DC versions 2021.005.20060 and earlier, 2020.004.30006 and earlier, and 2017.011.30199 and earlier.
CVE-2021-35982 is an Uncontrolled Search Path Element vulnerability that allows local attackers to execute arbitrary code.
Yes, non-administrative users can exploit CVE-2021-35982 by planting a malicious DLL.