CVE-2021-42720

7.8 HIGH

📋 TL;DR

Adobe Bridge versions 11.1.1 and earlier contain an out-of-bounds read vulnerability when parsing malicious files. An attacker could exploit this to execute arbitrary code with the privileges of the current user. Users who open untrusted files with vulnerable Adobe Bridge installations are affected.

💻 Affected Systems

Products:
  • Adobe Bridge
Versions: 11.1.1 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable when parsing files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through remote code execution with user privileges, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Limited code execution in user context, potentially stealing files or credentials accessible to the user.

🟢

If Mitigated

No impact if users don't open untrusted files or if application is patched.

🌐 Internet-Facing: LOW - Exploitation requires user interaction to open malicious files, not directly internet-exposed.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and bypassing ASLR/DEP protections.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.1.2 or later

Vendor Advisory: https://helpx.adobe.com/security/products/bridge/apsb21-94.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud desktop app. 2. Navigate to 'Apps' tab. 3. Find Adobe Bridge and click 'Update'. 4. Restart Adobe Bridge after update completes.

🔧 Temporary Workarounds

Disable file parsing

all

Prevent Adobe Bridge from automatically parsing unknown file types

Application whitelisting

windows

Restrict Adobe Bridge execution to trusted directories only

🧯 If You Can't Patch

  • Implement strict user training against opening untrusted files
  • Use application control to block Adobe Bridge execution entirely

🔍 How to Verify

Check if Vulnerable:

Check Adobe Bridge version in Help > About Adobe Bridge

Check Version:

On Windows: wmic product where name="Adobe Bridge" get version

Verify Fix Applied:

Verify version is 11.1.2 or higher in Help > About Adobe Bridge

📡 Detection & Monitoring

Log Indicators:

  • Adobe Bridge crash logs with memory access violations
  • Unexpected child processes spawned from Adobe Bridge

Network Indicators:

  • Outbound connections from Adobe Bridge to unknown IPs

SIEM Query:

source="adobe_bridge" AND (event_type="crash" OR process_name="cmd.exe" OR process_name="powershell.exe")

🔗 References

📤 Share & Export