CVE-2021-28595

7.8 HIGH

📋 TL;DR

CVE-2021-28595 is an uncontrolled search path vulnerability in Adobe Dimension that allows arbitrary code execution when a user opens a malicious file. Attackers can exploit this to run code with the victim's privileges, affecting all users of Adobe Dimension 3.4 and earlier versions.

💻 Affected Systems

Products:
  • Adobe Dimension
Versions: 3.4 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Malware installation or credential theft when users open malicious project files from untrusted sources.

🟢

If Mitigated

No impact if users only open trusted files and have proper endpoint protection.

🌐 Internet-Facing: LOW - Requires user interaction with malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be tricked into opening malicious files via phishing or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening malicious file) but is straightforward once the malicious file is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Adobe Dimension 3.4.1 or later

Vendor Advisory: https://helpx.adobe.com/security/products/dimension/apsb21-40.html

Restart Required: Yes

Instructions:

1. Open Adobe Dimension. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 3.4.1 or later. 4. Restart the application.

🔧 Temporary Workarounds

Restrict file opening

all

Only open Adobe Dimension files from trusted sources and verify file integrity before opening.

Application control

all

Use application whitelisting to prevent execution of unauthorized binaries that might be dropped via this vulnerability.

🧯 If You Can't Patch

  • Discontinue use of Adobe Dimension until patched
  • Implement strict file validation policies and user training about opening untrusted files

🔍 How to Verify

Check if Vulnerable:

Check Adobe Dimension version: Open Adobe Dimension, go to Help > About Adobe Dimension. If version is 3.4 or earlier, you are vulnerable.

Check Version:

Not applicable - check via application GUI

Verify Fix Applied:

Verify version is 3.4.1 or later in Help > About Adobe Dimension.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process execution from Adobe Dimension directory
  • Suspicious file operations following Adobe Dimension launch

Network Indicators:

  • Unusual outbound connections from Adobe Dimension process

SIEM Query:

Process creation where parent process contains 'Dimension' and child process is suspicious (e.g., cmd.exe, powershell.exe, wscript.exe)

🔗 References

📤 Share & Export