8.5
CVE-2021-28634
- EPSS 3.58%
- Published 20.08.2021 19:15:09
- Last modified 21.11.2024 05:59:59
- Source psirt@adobe.com
- Teams watchlist Login
- Open Login
Acrobat Reader DC versions 2021.005.20054 (and earlier), 2020.004.30005 (and earlier) and 2017.011.30197 (and earlier) are affected by an Improper Neutralization of Special Elements used in an OS Command. An authenticated attacker could leverage this vulnerability to achieve arbitrary code execution on the host machine in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Data is provided by the National Vulnerability Database (NVD)
Adobe ≫ Acrobat Dc SwEditioncontinuous Version >= 15.008.20082 <= 21.005.20054
Adobe ≫ Acrobat Dc SwEditionclassic Version >= 17.011.30059 <= 17.011.30197
Adobe ≫ Acrobat Dc SwEditionclassic Version >= 20.001.30005 <= 20.004.30005
Adobe ≫ Acrobat Reader Dc SwEditioncontinuous Version >= 15.008.20082 <= 21.005.20054
Adobe ≫ Acrobat Reader Dc SwEditionclassic Version >= 17.011.30059 <= 17.011.30197
Adobe ≫ Acrobat Reader Dc SwEditionclassic Version >= 20.001.30005 <= 20.004.30005
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 3.58% | 0.873 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.5 | 6.8 | 10 |
AV:N/AC:M/Au:S/C:C/I:C/A:C
|
psirt@adobe.com | 8.2 | 1.5 | 6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.