CVE-2021-21082

7.8 HIGH

📋 TL;DR

This memory corruption vulnerability in Adobe Photoshop allows attackers to execute arbitrary code by tricking users into opening malicious files. It affects Photoshop versions 21.2.5 and earlier, and 22.2 and earlier. Successful exploitation requires user interaction but gives attackers full control of the victim's system.

💻 Affected Systems

Products:
  • Adobe Photoshop
Versions: 21.2.5 and earlier, 22.2 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to data exfiltration, installation of backdoors, or credential harvesting from the compromised user account.

🟢

If Mitigated

Limited impact if user opens file in sandboxed environment or with restricted privileges, though still potential for local data access.

🌐 Internet-Facing: LOW - Exploitation requires user interaction to open malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, but still requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to open malicious file but no authentication needed. Attack complexity is low once malicious file is opened.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.2.6 and 22.3

Vendor Advisory: https://helpx.adobe.com/security/products/photoshop/apsb21-17.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find Photoshop and click 'Update'. 4. Restart Photoshop after update completes.

🔧 Temporary Workarounds

Restrict Photoshop file execution

windows

Configure application control policies to restrict Photoshop from opening files from untrusted sources

User education and file validation

all

Train users to only open Photoshop files from trusted sources and validate file integrity

🧯 If You Can't Patch

  • Implement application whitelisting to restrict Photoshop execution to trusted directories only
  • Configure user accounts with minimal privileges and run Photoshop in sandboxed environments

🔍 How to Verify

Check if Vulnerable:

Check Photoshop version via Help > About Photoshop in the application menu

Check Version:

On Windows: Check registry at HKEY_LOCAL_MACHINE\SOFTWARE\Adobe\Photoshop\[Version]\PluginVersion. On macOS: Check /Applications/Adobe Photoshop [Version]/Adobe Photoshop [Version].app/Contents/Info.plist

Verify Fix Applied:

Verify version is 21.2.6 or higher for Photoshop 21.x, or 22.3 or higher for Photoshop 22.x

📡 Detection & Monitoring

Log Indicators:

  • Photoshop crash logs with memory access violations
  • Unexpected Photoshop process spawning child processes
  • Photoshop accessing unusual file locations

Network Indicators:

  • Photoshop process making unexpected outbound connections after file open
  • DNS requests to suspicious domains following Photoshop execution

SIEM Query:

EventID=1 AND (Image='*photoshop.exe' OR Image='*Adobe Photoshop*') AND (CommandLine='*malicious*' OR ParentCommandLine='*malicious*')

🔗 References

📤 Share & Export