8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.643 Medium
EPSS
Percentile
97.8%
02/09/2021
Critical
Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, cause denial of service, bypass security restrictions.
Public exploits exist for this vulnerability.
Adobe Acrobat DC Continuous earlier than 2021.001.20135
Adobe Acrobat 2020 Classic earlier than 2020.001.30020
Adobe Acrobat 2017 Classic earlier than 2017.011.30190
Adobe Acrobat Reader DC Continuous earlier than 2021.001.20135
Adobe Acrobat Reader 2020 Classic earlier than 2020.001.30020
Adobe Acrobat Reader 2017 Classic earlier than 2017.011.30190
Update to the latest version
Download Adobe Acrobat Reader DC
ACE
Adobe Acrobat Reader DC Continuous
CVE-2021-210358.8Critical
CVE-2021-210604.6Warning
CVE-2021-210344.3Warning
CVE-2021-210367.8Critical
CVE-2021-210377.8Critical
CVE-2021-210587.8Critical
CVE-2021-210288.8Critical
CVE-2021-210627.8Critical
CVE-2021-210447.8Critical
CVE-2021-210417.8Critical
CVE-2021-210637.8Critical
CVE-2021-210576.6High
CVE-2021-210338.8Critical
CVE-2021-210387.8Critical
CVE-2021-210463.3Warning
CVE-2021-210458.2Critical
CVE-2021-210613.3Warning
CVE-2021-210178.8Critical
CVE-2021-210407.8Critical
CVE-2021-210397.8Critical
CVE-2021-210426.5High
CVE-2021-210218.8Critical
CVE-2021-210597.8Critical
CVE-2021-210867.8Critical
CVE-2021-210887.8Critical
CVE-2021-285466.5High
CVE-2021-210893.3Warning
CVE-2021-285458.1Critical
CVE-2021-407235.5High
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21017
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21021
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21028
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21033
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21034
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21035
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21036
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21037
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21038
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21039
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21040
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21041
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21042
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21044
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21045
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21046
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21057
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21058
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21059
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21060
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21061
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21062
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21063
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21086
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21088
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21089
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28545
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28546
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40723
get2.adobe.com/uk/reader/
helpx.adobe.com/security/products/acrobat/apsb21-09.html
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Adobe-Acrobat-2017/
threats.kaspersky.com/en/product/Adobe-Acrobat-2020/
threats.kaspersky.com/en/product/Adobe-Acrobat-DC-Continuous/
threats.kaspersky.com/en/product/Adobe-Acrobat-Reader-2017/
threats.kaspersky.com/en/product/Adobe-Acrobat-Reader-2020/
threats.kaspersky.com/en/product/Adobe-Acrobat-Reader-DC-Continuous/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.643 Medium
EPSS
Percentile
97.8%