Lucene search

K
vulnrichmentAdobeVULNRICHMENT:CVE-2021-21045
HistoryFeb 11, 2021 - 7:42 p.m.

CVE-2021-21045 Acrobat Reader DC Improper Installer Access Control Vulnerability Could Lead To Privilege Escalation

2021-02-1119:42:20
CWE-284
adobe
github.com
3
cve-2021 adobe acrobat

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

26.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an improper access control vulnerability. An unauthenticated attacker could leverage this vulnerability to elevate privileges in the context of the current user.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:adobe:acrobat_reader_2017:*:*:*:*:*:*:*:*"
    ],
    "vendor": "adobe",
    "product": "acrobat_reader_2017",
    "versions": [
      {
        "status": "affected",
        "version": "17.0",
        "versionType": "custom",
        "lessThanOrEqual": "17.011.30188"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:adobe:acrobat_2017:*:*:*:*:*:*:*:*"
    ],
    "vendor": "adobe",
    "product": "acrobat_2017",
    "versions": [
      {
        "status": "affected",
        "version": "17.0",
        "versionType": "custom",
        "lessThanOrEqual": "17.011.30188"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:adobe:acrobat_reader_2020:*:*:*:*:*:*:*:*"
    ],
    "vendor": "adobe",
    "product": "acrobat_reader_2020",
    "versions": [
      {
        "status": "affected",
        "version": "20.0",
        "versionType": "custom",
        "lessThanOrEqual": "20.001.30018"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:adobe:acrobat_2020:*:*:*:*:*:*:*:*"
    ],
    "vendor": "adobe",
    "product": "acrobat_2020",
    "versions": [
      {
        "status": "affected",
        "version": "20.0",
        "versionType": "custom",
        "lessThanOrEqual": "20.001.30018"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:windows:*:*"
    ],
    "vendor": "adobe",
    "product": "acrobat_reader_dc",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "20.013.20074"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:macos:*:*"
    ],
    "vendor": "adobe",
    "product": "acrobat_reader_dc",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "20.013.20074"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:*:macos:*:*"
    ],
    "vendor": "adobe",
    "product": "acrobat_dc",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "20.013.20074",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:*:windows:*:*"
    ],
    "vendor": "adobe",
    "product": "acrobat_dc",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "20.013.20074",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

26.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total