What We Do
How We Do
Resources
Company
Partners
Get Started
Security advisories

Adobe Reader Critical Zero-Day Vulnerability

February 9, 2021 | 1 MIN READ

Speak With A Security Expert Now

TALK TO AN EXPERT

THE THREAT

On February 9, 2021, Adobe announced security patches for a variety of vulnerabilities affecting their products, including a previously unidentified zero-day vulnerability. The zero-day vulnerability (CVE-2021-21017) affects Adobe Reader on Windows and macOS devices and is being actively exploited in the wild for users on Windows. CVE-2021-21017 is a heap-based buffer overflow vulnerability, that if exploited allows for remote code execution. The vulnerability is rated as critical by Adobe.

As this vulnerability is already being exploited by actors in the wild, it is highly recommended that organizations test and deploy the official Adobe patch as soon as possible.

What we’re doing about it

What you should do about it

Additional information

Details relating to attacks exploiting CVE-2021-21017 in the wild are currently not publicly available. eSentire security teams are actively tracking this threat for additional details.

Outside of CVE-2021-21017, Adobe released 16 other vulnerabilities ranked as critical, along with a variety of less severe vulnerabilities. At this time, only CVE-2021-21017 has been identified as being exploited in the wild. It is recommended that organizations apply all relevant Adobe patches as soon as possible to avoid being impacted by this vulnerability.

References:

[1] https://helpx.adobe.com/security/products/acrobat/apsb21-09.html

View Most Recent Advisories