CVE-2021-28562Use After Free in Adobe Acrobat Reader

CWE-416Use After Free6 documents5 sources
Severity
8.8HIGHNVD
EPSS
22.9%
top 4.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 28
Latest updateMay 24

Description

Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by a Use After Free vulnerability when executing search queries through Javascript. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5adobe/acrobat_readerunspecified2020.001.30020+3
NVDadobe/acrobat_reader_dc15.008.2008221.001.20150
NVDadobe/acrobat_dc15.008.2008221.001.20150

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hhvh-8925-wvqg: Acrobat Reader DC versions versions 20212022-05-24
CVEList
Adobe Acrobat Reader use-after-free could lead to arbitrary code execution2021-06-28

🕵️Threat Intelligence

3
Talos
Vulnerability Spotlight: Code execution vulnerability in Adobe Acrobat Reader2021-05-11
Qualys
Microsoft & Adobe Patch Tuesday (May 2021) – Qualys covers 85 Vulnerabilities, 26 Critical2021-05-11
Talos
Vulnerability Spotlight: Code execution vulnerability in Adobe Acrobat Reader2021-05-11
CVE-2021-28562 — Use After Free in Adobe Acrobat Reader | cvebase