CVE-2021-39820

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code on affected Adobe InDesign installations by tricking users into opening malicious TIFF files. It affects users running vulnerable versions of Adobe InDesign on any operating system. Successful exploitation requires user interaction to open a crafted file.

💻 Affected Systems

Products:
  • Adobe InDesign
Versions: 16.3 and earlier, 16.3.1 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware installation on the affected workstation, potentially leading to credential theft or data exfiltration.

🟢

If Mitigated

Limited impact with proper application whitelisting, file type restrictions, and user awareness training preventing malicious file execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious TIFF file. No public exploit code available at time of advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.3.2 or later

Vendor Advisory: https://helpx.adobe.com/security/products/indesign/apsb21-73.html

Restart Required: Yes

Instructions:

1. Open Adobe InDesign. 2. Go to Help > Updates. 3. Install available updates to version 16.3.2 or later. 4. Restart the application.

🔧 Temporary Workarounds

Block TIFF file extensions

windows

Prevent InDesign from opening TIFF files via group policy or application control

User awareness training

all

Train users not to open TIFF files from untrusted sources

🧯 If You Can't Patch

  • Restrict user permissions to prevent code execution
  • Implement application whitelisting to block unauthorized executables

🔍 How to Verify

Check if Vulnerable:

Check InDesign version via Help > About InDesign. If version is 16.3, 16.3.1 or earlier, system is vulnerable.

Check Version:

Not applicable - check via application GUI

Verify Fix Applied:

Verify version is 16.3.2 or later via Help > About InDesign.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected InDesign crashes
  • Process creation from InDesign with unusual command lines

Network Indicators:

  • Outbound connections from InDesign process to unknown IPs

SIEM Query:

Process creation where parent_process_name contains 'InDesign' and (process_name contains 'cmd.exe' or process_name contains 'powershell.exe')

🔗 References

📤 Share & Export