7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
8.7 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:C/I:N/A:N
0.004 Low
EPSS
Percentile
73.9%
02/12/2019
Critical
Multiple vulnerabilities were found in Adobe Acrobat and Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges.
Adobe Acrobat DC Continuous earlier than 2019.010.20091
Adobe Acrobat Reader DC Continuous earlier than 2019.010.20091
Adobe Acrobat 2017 (Classic 2017 Track) earlier than 2017.011.30120
Adobe Acrobat Reader 2017 (Classic 2017 Track) earlier than 2017.011.30120
Adobe Acrobat DC (Classic 2015 Track) earlier than 2015.006.30475
Adobe Acrobat Reader DC (Classic 2015 Track) earlier than 2015.006.30475
Update to the latest version
Download Adobe Acrobat Reader DC
ACE
Adobe Acrobat Reader DC Continuous
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7021
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7022
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7023
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7024
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7028
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7030
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7032
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7033
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7034
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7035
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7036
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7038
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7041
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7042
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7043
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7044
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7045
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7047
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7048
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7049
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7053
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7055
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7056
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7057
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7058
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7059
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7063
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7064
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7065
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7067
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7069
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7070
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7071
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7072
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7073
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7074
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7075
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7077
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7078
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7079
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7081
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7089
get.adobe.com/ru/reader/
helpx.adobe.com/security/products/acrobat/apsb19-07.html
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Adobe-Acrobat-2017/
threats.kaspersky.com/en/product/Adobe-Acrobat-DC-Classic/
threats.kaspersky.com/en/product/Adobe-Acrobat-DC-Continuous/
threats.kaspersky.com/en/product/Adobe-Acrobat-Reader-2017/
threats.kaspersky.com/en/product/Adobe-Acrobat-Reader-DC-Classic/
threats.kaspersky.com/en/product/Adobe-Acrobat-Reader-DC-Continuous/
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
8.7 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:C/I:N/A:N
0.004 Low
EPSS
Percentile
73.9%