First published: Fri Jan 14 2022(Updated: )
Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a Violation of Secure Design Principles that could lead to a Security feature bypass. Acrobat Reader DC displays a warning message when a user clicks on a PDF file, which could be used by an attacker to mislead the user. In affected versions, this warning message does not include custom protocols when used by the sender. User interaction is required to abuse this vulnerability as they would need to click 'allow' on the warning message of a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat | >=15.008.20082<=21.007.20099 | |
Adobe Acrobat Reader | >=15.008.20082<=21.007.20099 | |
Microsoft Windows | ||
Adobe Acrobat Reader | >=17.011.30059<=17.011.30204 | |
Adobe Acrobat Reader | >=20.001.30005<=20.004.30017 | |
Adobe Acrobat Reader | >=17.011.30059<=17.011.30204 | |
Adobe Acrobat Reader | >=20.001.30005<=20.004.30017 | |
Apple iOS and macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44714 is classified as a security feature bypass, which is considered a significant vulnerability.
To fix CVE-2021-44714, update Adobe Acrobat Reader DC to the latest version released by Adobe.
CVE-2021-44714 affects Acrobat Reader DC version 21.007.20099 and earlier, as well as versions 20.004.30017 and 17.011.30204 and earlier.
CVE-2021-44714 has the potential for exploitation, but the specifics of remote exploitation depend on user interaction.
CVE-2021-44714 involves a violation of secure design principles that may lead to a circumvention of intended security features in Adobe Acrobat.