Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker would have the ability to completely manipulate data in a certified PDF without invalidating the original certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/acrobat/apsb21-09.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
08 Sep 2021, 17:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
28 Jun 2021, 20:08
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 8.1 |
28 Jun 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker would have the ability to completely manipulate data in a certified PDF without invalidating the original certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file. |
11 Jun 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker could leverage this vulnerability to show arbitrary content in a certified PDF without invalidating the certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file. |
27 May 2021, 01:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker would have the ability to completely manipulate data in a certified PDF without invalidating the original certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file. |
07 Apr 2021, 14:10
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://helpx.adobe.com/security/products/acrobat/apsb21-09.html - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 6.5 |
CPE | cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:* cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:* cpe:2.3:o:apple:mac_os:-:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:* |
01 Apr 2021, 14:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-04-01 14:15
Updated : 2023-12-10 13:55
NVD link : CVE-2021-28545
Mitre link : CVE-2021-28545
CVE.ORG link : CVE-2021-28545
JSON object : View
Products Affected
adobe
- acrobat_reader
- acrobat
- acrobat_reader_dc
- acrobat_dc
microsoft
- windows
apple
- macos
CWE
CWE-353
Missing Support for Integrity Check