CVE-2021-28586

7.8 HIGH

📋 TL;DR

CVE-2021-28586 is an out-of-bounds write vulnerability in Adobe After Effects that could allow arbitrary code execution when a user opens a malicious file. This affects After Effects 18.0 and earlier versions, putting users who open untrusted project files at risk.

💻 Affected Systems

Products:
  • Adobe After Effects
Versions: 18.0 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. User interaction (opening malicious file) is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the user's system and potentially pivoting to other systems.

🟠

Likely Case

Local privilege escalation leading to data theft, ransomware deployment, or persistence mechanisms installation.

🟢

If Mitigated

Limited impact with proper user training and file validation controls preventing malicious file execution.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code was available at disclosure time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: After Effects 18.1 and later

Vendor Advisory: https://helpx.adobe.com/security/products/after_effects/apsb21-33.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find After Effects and click 'Update'. 4. Follow prompts to install version 18.1 or later. 5. Restart computer after installation.

🔧 Temporary Workarounds

Restrict file opening

all

Configure After Effects to only open trusted files from known sources

Application sandboxing

all

Run After Effects in a sandboxed environment to limit potential damage

🧯 If You Can't Patch

  • Implement strict file validation policies to prevent opening untrusted After Effects project files
  • Use application whitelisting to restrict After Effects execution to trusted environments only

🔍 How to Verify

Check if Vulnerable:

Check After Effects version: Open After Effects, go to Help > About After Effects. If version is 18.0 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where name="Adobe After Effects" get version
On macOS: /Applications/Adobe\ After\ Effects\ */Adobe\ After\ Effects.app/Contents/Info.plist | grep -A1 CFBundleShortVersionString

Verify Fix Applied:

Verify After Effects version is 18.1 or later in Help > About After Effects.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected After Effects crashes
  • Suspicious file opening events in application logs
  • Unusual process spawning from After Effects

Network Indicators:

  • Outbound connections from After Effects to unknown IPs
  • DNS requests for suspicious domains after file opening

SIEM Query:

source="*after_effects*" AND (event_type="crash" OR file_path="*.aep" OR process_name="AfterFX.exe")

🔗 References

📤 Share & Export