CVE-2021-43754

7.8 HIGH

📋 TL;DR

Adobe Prelude versions 22.1.1 and earlier contain an out-of-bounds write vulnerability that allows attackers to execute arbitrary code by tricking users into opening malicious files. This affects all users running vulnerable versions of Adobe Prelude. Successful exploitation requires user interaction to open a specially crafted file.

💻 Affected Systems

Products:
  • Adobe Prelude
Versions: 22.1.1 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or malware installation on the affected workstation, compromising user data and system integrity.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only crashing the application.

🌐 Internet-Facing: LOW - Requires user interaction with malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or malicious files on network shares.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious files. No public exploit code available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.1.2 or later

Vendor Advisory: https://helpx.adobe.com/security/products/prelude/apsb21-114.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' tab. 3. Find Adobe Prelude and click 'Update'. 4. Alternatively, download latest version from Adobe website. 5. Restart system after installation.

🔧 Temporary Workarounds

Restrict file opening

all

Configure application to only open trusted files or disable automatic file opening

Application sandboxing

all

Run Adobe Prelude in restricted environment or virtual machine

🧯 If You Can't Patch

  • Restrict user privileges to standard user accounts (not administrator)
  • Implement application whitelisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check Adobe Prelude version in Help > About Adobe Prelude. If version is 22.1.1 or earlier, system is vulnerable.

Check Version:

On Windows: Check version in Control Panel > Programs. On macOS: Check in Applications folder or use 'mdls' command on application bundle.

Verify Fix Applied:

Verify version is 22.1.2 or later in Help > About Adobe Prelude. Test opening various file types to ensure stability.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected child processes spawned from Adobe Prelude

Network Indicators:

  • Unusual outbound connections from Adobe Prelude process

SIEM Query:

Process creation where parent process contains 'prelude' AND (process contains 'cmd' OR process contains 'powershell' OR process contains 'bash')

🔗 References

📤 Share & Export