CVE-2021-43021

7.8 HIGH

📋 TL;DR

This vulnerability in Adobe Premiere Rush allows an attacker to execute arbitrary code on a user's system by tricking them into opening a malicious EXR file. It affects users of Adobe Premiere Rush version 1.5.16 and earlier, requiring user interaction to exploit. The risk is limited to the context of the current user's privileges.

💻 Affected Systems

Products:
  • Adobe Premiere Rush
Versions: 1.5.16 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with arbitrary code execution, potentially leading to data theft, ransomware deployment, or lateral movement within a network.

🟠

Likely Case

Local code execution allowing malware installation, file manipulation, or credential harvesting on the affected system.

🟢

If Mitigated

Limited impact if user privileges are restricted, with potential for isolated system damage but no network-wide compromise.

🌐 Internet-Facing: LOW, as exploitation requires user interaction with a malicious file, not direct network exposure.
🏢 Internal Only: MEDIUM, due to the need for social engineering or internal file sharing to trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious EXR file, making it less trivial but feasible with social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.17 or later

Vendor Advisory: https://helpx.adobe.com/security/products/premiere_rush/apsb21-101.html

Restart Required: Yes

Instructions:

1. Open Adobe Premiere Rush. 2. Go to Help > Check for Updates. 3. Install any available updates to version 1.5.17 or higher. 4. Restart the application as prompted.

🔧 Temporary Workarounds

Block EXR file execution

all

Prevent opening of EXR files in Adobe Premiere Rush by adjusting file associations or using application controls.

Not applicable; configure via OS settings or security software.

🧯 If You Can't Patch

  • Restrict user privileges to limit potential damage from code execution.
  • Implement email and web filtering to block malicious EXR files and educate users on safe file handling.

🔍 How to Verify

Check if Vulnerable:

Check the Adobe Premiere Rush version in the application's About or Help menu; if it is 1.5.16 or earlier, it is vulnerable.

Check Version:

On Windows: Check via application interface. On macOS: Use 'defaults read /Applications/Adobe\ Premiere\ Rush.app/Contents/Info.plist CFBundleShortVersionString' in terminal.

Verify Fix Applied:

Confirm the version is 1.5.17 or later after updating and restarting the application.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or unexpected process launches in Adobe Premiere Rush logs.

Network Indicators:

  • Unusual outbound connections from Adobe Premiere Rush process post-file opening.

SIEM Query:

Example: 'process_name:"Adobe Premiere Rush" AND event_type:crash OR process_name:"Adobe Premiere Rush" AND network_connection:outbound'

🔗 References

📤 Share & Export