CVE-2021-21062

7.8 HIGH

📋 TL;DR

A memory corruption vulnerability in Adobe Acrobat Reader DC allows arbitrary code execution when parsing malicious PDF files. Attackers can exploit this by tricking users into opening specially crafted PDFs, potentially gaining full control of the affected system. This affects users running vulnerable versions of Acrobat Reader DC across multiple release tracks.

💻 Affected Systems

Products:
  • Adobe Acrobat Reader DC
Versions: 2020.013.20074 and earlier, 2020.001.30018 and earlier, 2017.011.30188 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations of affected versions are vulnerable. Requires user interaction to open malicious PDF.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the logged-in user, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Malicious actors using phishing emails with booby-trapped PDF attachments to compromise individual workstations, then moving laterally within networks.

🟢

If Mitigated

Limited impact with proper application whitelisting, network segmentation, and user training preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is straightforward once malicious PDF is opened. Memory corruption vulnerabilities in PDF parsers are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2020.013.20075, 2020.001.30019, 2017.011.30189 or later

Vendor Advisory: https://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Restart Required: Yes

Instructions:

1. Open Adobe Acrobat Reader DC. 2. Go to Help > Check for Updates. 3. Follow prompts to install available updates. 4. Restart the application when prompted.

🔧 Temporary Workarounds

Disable JavaScript in Adobe Reader

all

Prevents JavaScript-based exploitation vectors that might accompany memory corruption

Edit > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use Protected View

all

Force all PDFs to open in Protected View to limit potential damage

Edit > Preferences > Security (Enhanced) > Check 'Enable Protected View at startup'

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized PDF readers
  • Deploy network segmentation to limit lateral movement from compromised endpoints

🔍 How to Verify

Check if Vulnerable:

Check Help > About Adobe Acrobat Reader DC and compare version against affected ranges

Check Version:

On Windows: wmic product where name="Adobe Acrobat Reader DC" get version

Verify Fix Applied:

Verify version is 2020.013.20075+, 2020.001.30019+, or 2017.011.30189+

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes of AcroRd32.exe
  • Suspicious child processes spawned from AcroRd32.exe

Network Indicators:

  • Outbound connections from AcroRd32.exe to unknown external IPs
  • DNS requests for suspicious domains following PDF opening

SIEM Query:

process_name:"AcroRd32.exe" AND (event_id:1000 OR parent_process_name:"AcroRd32.exe")

🔗 References

📤 Share & Export