CVE-2021-28613

7.4 HIGH

📋 TL;DR

This vulnerability in Adobe Creative Cloud Desktop Application allows an attacker with local access, administrator privileges, and user interaction to arbitrarily overwrite files. It affects users running version 5.4 or earlier. Successful exploitation could lead to system compromise or data manipulation.

💻 Affected Systems

Products:
  • Adobe Creative Cloud Desktop Application
Versions: 5.4 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access, administrator privileges, and user interaction for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could overwrite critical system files, leading to complete system compromise, data destruction, or persistence mechanisms.

🟠

Likely Case

Local privilege escalation or targeted file manipulation affecting user data and application integrity.

🟢

If Mitigated

Limited impact due to required local access, admin privileges, and user interaction - proper access controls significantly reduce risk.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires multiple conditions: local access, admin privileges, and user interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5 or later

Vendor Advisory: https://helpx.adobe.com/security/products/creative-cloud/apsb21-76.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud Desktop Application. 2. Click on the gear icon. 3. Select 'Preferences'. 4. Go to 'Apps' tab. 5. Click 'Update' next to Creative Cloud Desktop App. 6. Restart the application when prompted.

🔧 Temporary Workarounds

Restrict Local Administrative Access

all

Limit the number of users with local administrator privileges to reduce attack surface.

User Awareness Training

all

Educate users about not running untrusted applications or granting unnecessary permissions.

🧯 If You Can't Patch

  • Implement strict least-privilege access controls and limit local administrator accounts
  • Monitor for suspicious file modification activities and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check Creative Cloud Desktop Application version in Preferences > Apps tab

Check Version:

On Windows: Check 'C:\Program Files (x86)\Adobe\Adobe Creative Cloud\ACC\Creative Cloud.exe' properties. On macOS: Check '/Applications/Utilities/Adobe Creative Cloud/ACC/Creative Cloud.app' version.

Verify Fix Applied:

Verify version is 5.5 or later in Preferences > Apps tab

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file modification events in Creative Cloud directories
  • Administrative privilege escalation attempts

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

EventID 4688 (Windows) with Creative Cloud process creating/modifying files outside expected directories

🔗 References

📤 Share & Export