Discover the impact of CVE-2021-28546 affecting Acrobat Reader DC. Learn about the missing support for an integrity check vulnerability and how to mitigate the risk.
Acrobat Reader DC versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier), and 2017.011.30188 (and earlier) are affected by a vulnerability allowing an attacker to modify content in a certified PDF without invalidating the certification.
Understanding CVE-2021-28546
This CVE pertains to a missing support for integrity check in Adobe Acrobat Reader DC versions, leading to a high integrity impact.
What is CVE-2021-28546?
Acrobat Reader DC versions are missing support for an integrity check, enabling unauthenticated attackers to tamper with certified PDF content without detection.
The Impact of CVE-2021-28546
The vulnerability allows attackers to modify content in certified PDFs without invalidation, requiring user interaction to exploit by opening a malicious file.
Technical Details of CVE-2021-28546
This CVE has a CVSS v3.1 base score of 6.5, with an attack complexity of low and user interaction required for exploitation.
Vulnerability Description
The vulnerability in Acrobat Reader DC versions allows attackers to make modifications to certified PDF content.
Affected Systems and Versions
Acrobat Reader DC versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier), and 2017.011.30188 (and earlier) are impacted.
Exploitation Mechanism
Attackers can manipulate content in certified PDFs without triggering certification invalidation, necessitating victim interaction.
Mitigation and Prevention
To address CVE-2021-28546, immediate actions and long-term security practices are recommended.
Immediate Steps to Take
Users should update to the latest version of Acrobat Reader DC and exercise caution when opening PDF files from untrusted sources.
Long-Term Security Practices
Practicing good cyber hygiene, such as regular software updates and user awareness training, can enhance overall security.
Patching and Updates
Adobe has released patches to address the vulnerability. Ensure timely application of updates to mitigate the risk of exploitation.