Skip to main content

CVE-2021-21068: Creation of Temporary File in Directory with Incorrect Permissions (CWE-379) in Adobe Creative Cloud (desktop component)

Medium
Published: Fri Mar 12 2021 (03/12/2021, 18:12:08 UTC)
Source: CVE
Vendor/Project: Adobe
Product: Creative Cloud (desktop component)

Description

Adobe Creative Cloud Desktop Application version 5.3 (and earlier) is affected by a file handling vulnerability that could allow an attacker to cause arbitrary file overwriting. Exploitation of this issue requires physical access and user interaction.

AI-Powered Analysis

AILast updated: 06/24/2025, 01:10:45 UTC

Technical Analysis

CVE-2021-21068 is a vulnerability found in the Adobe Creative Cloud desktop application, specifically versions 5.3 and earlier. The issue arises from improper handling of temporary files, where the application creates temporary files in directories with incorrect permissions (CWE-379). This misconfiguration can allow an attacker with physical access and requiring user interaction to overwrite arbitrary files on the affected system. The vulnerability stems from the insecure creation of temporary files without adequate permission restrictions, potentially enabling privilege escalation or tampering with application or system files. However, exploitation is constrained by the need for physical access to the device and user interaction, limiting remote exploitation possibilities. There are no known exploits in the wild, and no official patches or updates have been linked in the provided information. The vulnerability impacts confidentiality, integrity, and availability to some extent by allowing unauthorized file modification, but the attack vector is limited. Adobe Creative Cloud is widely used by creative professionals and organizations for digital content creation, making this vulnerability relevant to environments where the desktop application is installed and used.

Potential Impact

For European organizations, the impact of CVE-2021-21068 is primarily related to the potential for local privilege escalation or unauthorized file modification on workstations running vulnerable versions of Adobe Creative Cloud. This could lead to tampering with project files, application configurations, or potentially system files if exploited successfully. The requirement for physical access and user interaction reduces the risk of widespread remote attacks but raises concerns in environments with shared or publicly accessible workstations, such as design studios, educational institutions, or public terminals. Confidentiality could be compromised if sensitive project files are overwritten or replaced, integrity could be undermined by unauthorized changes to files, and availability might be affected if critical files are corrupted. However, the overall risk is moderate due to the exploitation constraints. Organizations relying heavily on Adobe Creative Cloud for creative workflows may face operational disruptions or data integrity issues if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2021-21068, European organizations should implement the following specific measures: 1) Upgrade Adobe Creative Cloud desktop application to the latest version beyond 5.3 where this vulnerability is addressed, or apply any available security patches from Adobe promptly. 2) Restrict physical access to workstations running Adobe Creative Cloud, especially in shared or public environments, through controlled access policies and secure workstation placement. 3) Enforce strict user account controls and limit user privileges to prevent unauthorized file modifications. 4) Implement endpoint protection solutions that monitor and alert on suspicious file system changes, particularly in directories used by Adobe Creative Cloud for temporary files. 5) Educate users about the risks of interacting with unknown devices or files and the importance of reporting unusual system behavior. 6) Regularly audit file permissions on directories used by Adobe Creative Cloud to ensure they are not overly permissive. 7) Consider application whitelisting or sandboxing techniques to contain the impact of any potential exploitation. These targeted actions go beyond generic advice by focusing on the specific attack vector and operational context of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2020-12-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf17a5

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 1:10:45 AM

Last updated: 7/26/2025, 12:45:45 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats