Acrobat Reader DC versions 2020.013.20074, 2020.001.30018, and 2017.011.30188 are affected by Use After Free vulnerability (CWE-416), allowing arbitrary code execution. Learn about impact, mitigation steps, and updates.
Acrobat Reader DC versions 2020.013.20074, 2020.001.30018, and 2017.011.30188 are affected by a Use After Free vulnerability, allowing arbitrary code execution.
Understanding CVE-2021-21035
This CVE involves a Use After Free vulnerability in Acrobat Reader DC versions that could lead to arbitrary code execution by an unauthenticated attacker.
What is CVE-2021-21035?
Acrobat Reader DC versions 2020.013.20074, 2020.001.30018, and 2017.011.30188 are affected by a Use After Free vulnerability. This flaw could be exploited by an attacker to execute arbitrary code in the context of the current user.
The Impact of CVE-2021-21035
The vulnerability poses a high risk with a CVSS base score of 8.8 (High). It requires user interaction, where a victim needs to open a malicious file for exploitation.
Technical Details of CVE-2021-21035
This section covers a detailed analysis of the vulnerability.
Vulnerability Description
The Use After Free vulnerability in Acrobat Reader DC allows unauthenticated attackers to achieve arbitrary code execution.
Affected Systems and Versions
Acrobat Reader DC versions 2020.013.20074, 2020.001.30018, and 2017.011.30188 are impacted.
Exploitation Mechanism
Attackers can exploit this vulnerability by tricking victims into opening a malicious file, leading to arbitrary code execution.
Mitigation and Prevention
Here are the steps to mitigate and prevent exploitation of CVE-2021-21035.
Immediate Steps to Take
Users should update Acrobat Reader DC to the latest version and avoid opening files from untrusted sources.
Long-Term Security Practices
Implementing secure file handling practices and regular security updates can enhance overall system security.
Patching and Updates
Adobe has released patches to address this vulnerability. It is crucial to promptly apply these updates to protect systems.