CVE-2021-28580

8.8 HIGH

📋 TL;DR

CVE-2021-28580 is a buffer overflow vulnerability in Adobe Medium versions 2.4.5.331 and earlier that allows remote code execution when a user opens a malicious file. An unauthenticated attacker can exploit this to run arbitrary code with the victim's privileges. All users running vulnerable versions of Adobe Medium are affected.

💻 Affected Systems

Products:
  • Adobe Medium
Versions: 2.4.5.331 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer and potentially moving laterally through the network.

🟠

Likely Case

Attacker executes malicious code to steal data, install ransomware, or establish persistence on the victim's system.

🟢

If Mitigated

No impact if users don't open untrusted files or if the application is patched.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious file, but files can be delivered via email, downloads, or web links.
🏢 Internal Only: MEDIUM - Internal users could be tricked into opening malicious files shared through internal channels.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) but no authentication. Buffer overflow exploitation requires some technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.6 or later

Vendor Advisory: https://helpx.adobe.com/security/products/medium/apsb21-34.html

Restart Required: Yes

Instructions:

1. Open Adobe Medium. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 2.4.6 or later. 4. Restart the application.

🔧 Temporary Workarounds

Disable file opening from untrusted sources

all

Configure system or application to block opening of untrusted files in Adobe Medium

Application control via Windows Defender

windows

Use Windows Defender Application Control to restrict Adobe Medium from opening files

New-AppLockerPolicy -RuleType Path -Action Deny -Path "C:\Program Files\Adobe\Medium\Medium.exe" -User Everyone

🧯 If You Can't Patch

  • Uninstall Adobe Medium if not essential for business operations
  • Implement strict email filtering to block potentially malicious attachments

🔍 How to Verify

Check if Vulnerable:

Check Adobe Medium version in application settings or About dialog. If version is 2.4.5.331 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where name="Adobe Medium" get version
On macOS: /Applications/Adobe\ Medium.app/Contents/Info.plist | grep -A1 CFBundleShortVersionString

Verify Fix Applied:

Verify Adobe Medium version is 2.4.6 or later in application settings.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in Adobe Medium logs
  • Unexpected process creation from Medium.exe
  • File access to suspicious file types

Network Indicators:

  • Outbound connections from Medium.exe to unknown IPs
  • DNS requests for suspicious domains after file opening

SIEM Query:

source="*medium*" AND (event_type="crash" OR process_name="Medium.exe" AND parent_process!="explorer.exe")

🔗 References

📤 Share & Export