CVE-2021-44710Use After Free in Adobe Acrobat Reader

CWE-416Use After Free7 documents6 sources
Severity
7.8HIGHNVD
EPSS
3.0%
top 13.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 14
Latest updateJan 15

Description

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

CVEListV5adobe/acrobat_readerunspecified21.007.20099+3
NVDadobe/acrobat_reader17.011.3005917.011.30204+1
NVDadobe/acrobat_reader_dc15.008.2008221.007.20099
NVDadobe/acrobat17.011.3005917.011.30204+1
NVDadobe/acrobat_dc15.008.2008221.007.20099

🔴Vulnerability Details

2
GHSA
GHSA-6xrh-c7j6-5776: Acrobat Reader DC version 212022-01-15
CVEList
Adobe Acrobat Reader Use-after-free could lead to Arbitrary code execution2022-01-14

🕵️Threat Intelligence

4
Talos
Vulnerability Spotlight: Two vulnerabilities in Adobe Acrobat DC could lead to arbitrary code execution2022-01-11
Talos
Vulnerability Spotlight: Two vulnerabilities in Adobe Acrobat DC could lead to arbitrary code execution2022-01-11
Zscaler
Zscaler protects against 25 Adobe vulnerability | 01-11-2022
Huntress
Use-After-Free Explained: Master the Basics and Stay Secure | Huntress
CVE-2021-44710 — Use After Free in Adobe Acrobat Reader | cvebase