x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu

Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution

MS-ISAC ADVISORY NUMBER:

2021-114

DATE(S) ISSUED:

09/14/2021

OVERVIEW:

Multiple vulnerabilities have been discovered in Adobe Products, the most severe of which could allow for arbitrary code execution.

  • Adobe XMP Toolkit SDK is a development kit for Adobe’s Extensible Metadata Platform.
  • Adobe Photoshop and Adobe Photoshop Elements is a graphics editor.
  • Adobe Experience Manager is a content management solution for building websites, mobile apps, and forms.
  • Adobe Genuine Service is a service that periodically verifies whether Adobe apps on your machine are genuine and notifies you if they are not.
  • Adobe Digital Editions is an e-book reader software program.
  • Adobe Premiere and Adobe Premiere Pro is a video editing software.
  • Adobe Creative Cloud is a cloud service provided by Adobe where its software can be accessed all in one place.
  • Adobe ColdFusion is a web application development platform.
  • Adobe Framemaker is a document processing software used to write and edit large or complex documents.
  • Adobe InDesign is an industry-leading layout and page design software for print and digital media.
  • Adobe SVG Native viewer is a library that parses and renders SVG Native documents.
  • Adobe InCopy is a professional word processor.
  • Acrobat and Reader is a family of application software and Web services mainly used to create, view, and edit PDF documents.

Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

THREAT INTELLIGENCE:

There are currently no reports of these vulnerabilities being exploited in the wild.

SYSTEMS AFFECTED:

  • Adobe XMP-Toolkit-SDK 2021.07 and earlier versions
  • Photoshop 2020 21.2.11 and earlier versions
  • Photoshop 2021 22.5 and earlier versions
  • Adobe Experience Manager (AEM) 6.5.9.0 and earlier versions
  • Adobe Experience Manager (AEM) Cloud Service
  • Adobe Genuine Service 7.3 and earlier versions
  • Adobe Digital Editions 4.5.11.187646 and below
  • Adobe Premiere Elements 2021 [build 19.0 (20210127.daily.2235820) and earlier]
  • Photoshop Elements 2021 [build 19.0 (20210304.m.156367) and earlier]
  • Creative Cloud Desktop Application 5.4 and earlier version
  • ColdFusion 2018 Update 11 and earlier versions
  • ColdFusion 2021 Version 1 and earlier versions
  • Adobe Framemaker 2019 Update 8 and earlier
  • Adobe Framemaker 2020 Release Update 2 and earlier
  • Adobe InDesign 16.3.2 and earlier versions for macOS
  • Adobe InDesign 16.3 and earlier versions for Windows
  • Adobe InCopy 16.3.1 and earlier versions for macOS
  • Adobe SVG-Native-Viewer https://github.com/adobe/svg-native-viewer/commit/8182d14dfad5d1e10f53ed830328d7d9a3cfa96d and earlier versions for Linux
  • Adobe InCopy 16.3 and earlier versions for Windows
  • Adobe Premiere Pro 15.4 and earlier versions
  • Acrobat DC 2021.005.20060 and earlier versions for Windows
  • Acrobat Reader DC 2021.005.20060 and earlier versions for Windows
  • Acrobat DC 2021.005.20058 and earlier versions for macOS
  • Acrobat Reader DC 2021.005.20058 and earlier versions for macOS
  • Acrobat 2020 2020.004.30006 and earlier versions
  • Acrobat Reader 2020 2020.004.30006 and earlier versions
  • Acrobat 2017 2017.011.30199 and earlier versions
  • Acrobat Reader 2017 2017.011.30199 and earlier versions

RISK:

Government:
  • Large and medium government entities: MEDIUM
  • Small government entities: MEDIUM
Businesses:
  • Large and medium business entities: MEDIUM
  • Small business entities: MEDIUM
Home Users:
LOW

TECHNICAL SUMMARY:

Multiple vulnerabilities have been discovered in Adobe Products, the most severe of which could allow for arbitrary code execution. Details of these vulnerabilities are as follows:
Adobe XMP-Toolkit-SDK

  • Out-of-bounds Read, which could allow for Arbitrary file system read. (CVE-2021-40716)

Adobe Photoshop 2020 and 2021

  • Buffer Overflow, which could allow for Arbitrary code execution. (CVE-2021-40709)

Adobe Experience Manager (AEM)

  • Cross-site Scripting (XSS), which could allow for Arbitrary code execution. (CVE-2021-40711)
  • Improper Input Validation, which could allow for Application denial-of-service. (CVE-2021-40712)
  • Improper Certificate Validation, which could allow for Security feature bypass. (CVE-2021-40713)
  • Cross-site Scripting (XSS), which could allow for Arbitrary code execution. (CVE-2021-40714)

Adobe Genuine Service

  • Creation of Temporary File in Directory with Incorrect Permissions, which could allow for Privilege Escalation. (CVE-2021-40708)

Adobe Digital Editions

  • Creation of Temporary File in Directory with Incorrect Permissions, which could allow for Privilege Escalation. (CVE-2021-39828)
  • Creation of Temporary File in Directory with Incorrect Permissions, which could allow for Arbitrary file system write. (CVE-2021-39827)
  • OS Command Injection, which could allow for Arbitrary code execution. (CVE-2021-39826)

Adobe Premiere Elements

  • Access of Memory Location After End of Buffer, which could allow for Arbitrary code execution. (CVE-2021-39824, CVE-2021-40701, CVE-2021-40700, CVE-2021-40703, CVE-2021-40702)

Adobe Photoshop Elements

  • Out-of-bounds Write, which could allow for Arbitrary code execution. (CVE-2021-39825)

Creative Cloud Desktop Application

  • Creation of Temporary File in Directory with Incorrect Permissions, which could allow for Arbitrary file system write. (CVE-2021-28613)

Adobe ColdFusion

  • Use of Inherently Dangerous Function which could allow for Security feature bypass . (CVE-2021-40698)
  • Improper Access Control which could allow for Security feature bypass. (CVE-2021-40699)

Adobe Framemaker

  • Use After Free, which could allow for Arbitrary file system read. (CVE-2021-39835, CVE-2021-39833, CVE-2021-39834)
  • Out-of-bounds Read, which could allow for Arbitrary file system read. (CVE-2021-40697)
  • Access of Memory Location After End of Buffer, which could allow for Arbitrary code execution. (CVE-2021-39832, CVE-2021-39830)
  • Out-of-bounds Write, which could allow for Arbitrary code execution. (CVE-2021-39829, CVE-2021-39831)

Adobe InDesign

  • Access of Memory Location After End of Buffer, which could allow for Arbitrary code execution. (CVE-2021-39820)
  • Out-of-bounds Read, which could allow for Arbitrary code execution. (CVE-2021-39821, CVE-2021-39822)

Adobe SVG-Native-Viewer

  • Heap-based Buffer Overflow, which could allow for Arbitrary code execution. (CVE-2021-39823)

Adobe InCopy

  • Access of Memory Location After End of Buffer, which could allow for Arbitrary file system write. (CVE-2021-39819)
  • Access of Memory Location After End of Buffer, which could allow for Arbitrary code execution. (CVE-2021-39818)

Adobe Premiere Pro

  • Access of Memory Location After End of Buffer, which could allow for Arbitrary Code Execution. (CVE-2021-40710, CVE-2021-40715)

Adobe Acrobat and Reader

  • Type Confusion, which could allow for Arbitrary code execution. (CVE-2021-39841)
  • Heap-based Buffer Overflow, which could allow for Arbitrary code execution. (CVE-2021-39863)
  • Information Exposure, which could allow for Arbitrary file system read. (CVE-2021-39857, CVE-2021-39856, CVE-2021-39855)
  • Out-of-bounds Read, which could allow for a Memory leak. (CVE-2021-39844, CVE-2021-39861)
  • Out-of-bounds Read, which could allow for Arbitrary file system read. (CVE-2021-39858)
  • Out-of-bounds Write, which could allow for a Memory leak. (CVE-2021-39843)
  • Stack-based Buffer Overflow, which could allow for Arbitrary code execution. (CVE-2021-39846, CVE-2021-39845)
  • Uncontrolled Search Path Element, which could allow for Arbitrary code execution. (CVE-2021-35982)
  • Use After Free, which could allow for Arbitrary code execution. (CVE-2021-39859, CVE-2021-39840, CVE-2021-39842, CVE-2021-39839, CVE-2021-39838, CVE-2021-39837, CVE-2021-39836)
  • NULL Pointer Dereference, which could allow for a Memory leak. (CVE-2021-39860)
  • NULL Pointer Dereference, which could allow for Application denial-of-service. (CVE-2021-39852, CVE-2021-39854, CVE-2021-39853, CVE-2021-39850, CVE-2021-39849, CVE-2021-39851)

Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

RECOMMENDATIONS:

We recommend the following actions be taken:

  • Install the updates provided by Adobe immediately after appropriate testing.
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
  • Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from un-trusted sources.
  • Apply the Principle of Least Privilege to all systems and services.

REFERENCES:

CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28613 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35982 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39818 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39820 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39822 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39823 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39825 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39826 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39827 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39828 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39830 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39832 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39834 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39836 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39837 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39838 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39839 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39840 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39841 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39842 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39843 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39846 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39849 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39850 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39851 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39852 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39853 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39854 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39855 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39856 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39857 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39858 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39859 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39860 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39861 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39863 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40697 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40698 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40699 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40700 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40702 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40703 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40710 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40711 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40712 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40713 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40714 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40715 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40716

Get Email Updates When Cyber Threats Like This Arise

Arrow Subscribe to Advisories

Information Hub : Advisories


CONTROL: 1 --- ADVISORY CONTROL: 0
CONTROL: 2 --- ADVISORY CONTROL: 0
CONTROL: 3 --- ADVISORY CONTROL: 0
CONTROL: 4 --- ADVISORY CONTROL: 0