7.8
HIGH
CVE-2021-26391
Adobe Acrobat Memory Corruption Vulnerability
Description

Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.

INFO

Published Date :

Nov. 9, 2022, 9:15 p.m.

Last Modified :

Nov. 21, 2024, 5:56 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

1.8
Affected Products

The following products are affected by CVE-2021-26391 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Amd ryzen_3_5300g_firmware
2 Amd ryzen_3_5300ge_firmware
3 Amd ryzen_3_5300u_firmware
4 Amd ryzen_3_5400u_firmware
5 Amd ryzen_5_5500u_firmware
6 Amd ryzen_5_5560u_firmware
7 Amd ryzen_5_5600g_firmware
8 Amd ryzen_5_5600ge_firmware
9 Amd ryzen_5_5600h_firmware
10 Amd ryzen_5_5600hs_firmware
11 Amd ryzen_5_5600u_firmware
12 Amd ryzen_7_5700g_firmware
13 Amd ryzen_7_5700ge_firmware
14 Amd ryzen_7_5700u_firmware
15 Amd ryzen_7_5800h_firmware
16 Amd ryzen_7_5800hs_firmware
17 Amd ryzen_7_5800u_firmware
18 Amd ryzen_9_5900hs_firmware
19 Amd ryzen_9_5900hx_firmware
20 Amd ryzen_9_5980hs_firmware
21 Amd ryzen_9_5980hx_firmware
22 Amd radeon_pro_software
23 Amd radeon_software
24 Amd enterprise_driver
25 Amd radeon_rx_vega_56_firmware
26 Amd radeon_rx_vega_64_firmware
27 Amd ryzen_7_5700g
28 Amd ryzen_7_5700ge
29 Amd ryzen_5_5600g
30 Amd ryzen_5_5600ge
31 Amd ryzen_3_5300g
32 Amd ryzen_3_5300ge
33 Amd ryzen_7_5700u
34 Amd ryzen_5_5500u
35 Amd ryzen_3_5300u
36 Amd ryzen_9_5980hx
37 Amd ryzen_9_5980hs
38 Amd ryzen_9_5900hx
39 Amd ryzen_9_5900hs
40 Amd ryzen_7_5800h
41 Amd ryzen_7_5800hs
42 Amd ryzen_7_5800u
43 Amd ryzen_5_5600h
44 Amd ryzen_5_5600hs
45 Amd ryzen_5_5600u
46 Amd ryzen_5_5560u
47 Amd ryzen_3_5400u
48 Amd radeon_rx_5300
49 Amd radeon_rx_5300_xt
50 Amd radeon_rx_5300m
51 Amd radeon_rx_5500
52 Amd radeon_rx_5500_xt
53 Amd radeon_rx_5500m
54 Amd radeon_rx_5600
55 Amd radeon_rx_5600_xt
56 Amd radeon_rx_5600m
57 Amd radeon_rx_5700
58 Amd radeon_rx_5700_xt
59 Amd radeon_rx_5700m
60 Amd radeon_rx_6300m
61 Amd radeon_rx_6400
62 Amd radeon_rx_6500_xt
63 Amd radeon_rx_6500m
64 Amd radeon_rx_6600
65 Amd radeon_rx_6600_xt
66 Amd radeon_rx_6600m
67 Amd radeon_rx_6600s
68 Amd radeon_rx_6650_xt
69 Amd radeon_rx_6650m
70 Amd radeon_rx_6650m_xt
71 Amd radeon_rx_6700
72 Amd radeon_rx_6700_xt
73 Amd radeon_rx_6700m
74 Amd radeon_rx_6700s
75 Amd radeon_rx_6750_xt
76 Amd radeon_rx_6800
77 Amd radeon_rx_6800_xt
78 Amd radeon_rx_6800s
79 Amd radeon_rx_6900_xt
80 Amd radeon_rx_6950_xt
81 Amd radeon_pro_w5500
82 Amd radeon_pro_w5700
83 Amd radeon_pro_w6400
84 Amd radeon_pro_w6600
85 Amd radeon_pro_w6800
86 Amd radeon_pro_w5500x
87 Amd radeon_pro_w5700x
88 Amd radeon_pro_w6300m
89 Amd radeon_pro_w6500m
90 Amd radeon_pro_w6600m
91 Amd radeon_pro_w6600x
92 Amd radeon_pro_w6800x
93 Amd radeon_pro_w6800x_duo
94 Amd radeon_pro_w6900x
95 Amd radeon_rx_6800m
96 Amd radeon_rx_6850m_xt
97 Amd radeon_rx_vega_56
98 Amd radeon_rx_vega_64
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2021-26391.

URL Resource
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 Vendor Advisory
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-26391 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-26391 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Nov. 23, 2022

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 No Types Assigned https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 Vendor Advisory
    Added CWE NIST NVD-CWE-noinfo
    Added CPE Configuration AND OR *cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:* versions up to (excluding) 22.10.20 *cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:* versions up to (excluding) 22.q2 *cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:* versions up to (excluding) 22.5.2 OR cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-26391 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2021-26391 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} 0.00%

score

0.12319

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability