CVE-2021-43019

7.8 HIGH

📋 TL;DR

This CVE describes a privilege escalation vulnerability in Adobe Creative Cloud installer versions 5.5 and earlier. An attacker with initial low-privileged access can exploit the Setup.exe service to delete files and gain SYSTEM privileges during installation. Users running vulnerable Creative Cloud versions are affected.

💻 Affected Systems

Products:
  • Adobe Creative Cloud Desktop Application
Versions: 5.5 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the installer component; requires user interaction during installation process.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, allowing complete control over the system, data theft, and persistence mechanisms.

🟠

Likely Case

Local privilege escalation from a standard user to SYSTEM, enabling installation of malware, disabling security controls, or accessing protected resources.

🟢

If Mitigated

Limited impact if proper endpoint protection and least privilege principles are enforced, though privilege escalation could still occur.

🌐 Internet-Facing: LOW - This requires local access and user interaction during installation, making remote exploitation unlikely.
🏢 Internal Only: MEDIUM - Internal attackers or malware with initial foothold could exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to already have low-privileged code execution and user interaction during installation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.6 or later

Vendor Advisory: https://helpx.adobe.com/security/products/creative-cloud/apsb21-111.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Click on the gear icon (Preferences). 3. Navigate to Apps tab. 4. Click 'Check for Updates'. 5. Install any available updates. 6. Restart the system.

🔧 Temporary Workarounds

Restrict installer execution

windows

Limit who can run the Creative Cloud installer through group policy or application control

Use Windows AppLocker or Software Restriction Policies to block vulnerable installer versions

Least privilege enforcement

windows

Ensure users operate with minimal necessary privileges to reduce impact of initial compromise

Implement principle of least privilege through Active Directory or local policy

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of vulnerable Creative Cloud installers
  • Use endpoint detection and response (EDR) tools to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Creative Cloud version: Open Creative Cloud app → Help → About Adobe Creative Cloud. If version is 5.5 or earlier, system is vulnerable.

Check Version:

Check registry: reg query "HKLM\SOFTWARE\Adobe\Adobe Creative Cloud" /v Version

Verify Fix Applied:

Verify version is 5.6 or later using same method, and check that no older installer files remain on system.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing privilege escalation attempts
  • Setup.exe process spawning with SYSTEM privileges unexpectedly
  • File deletion events in sensitive directories

Network Indicators:

  • Unusual outbound connections following local privilege escalation

SIEM Query:

EventID=4688 AND ProcessName="Setup.exe" AND NewProcessName contains "SYSTEM"

🔗 References

📤 Share & Export