CVE-2026-21352
Published: 10 February 2026
Summary
CVE-2026-21352 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Adobe Dng Software Development Kit. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 12.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely flaw remediation, directly mitigating this out-of-bounds write vulnerability by patching affected Adobe DNG SDK versions.
SI-16 enforces memory protections that prevent exploitation of out-of-bounds writes for arbitrary code execution.
SI-10 validates file inputs to block malformed DNG files that trigger the out-of-bounds write vulnerability in the SDK.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Out-of-bounds write enables client-side arbitrary code execution via malicious DNG file opened by user (T1203 Exploitation for Client Execution + T1204.002 Malicious File).
NVD Description
DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must…
more
open a malicious file.
Deeper analysisAI
CVE-2026-21352 is an out-of-bounds write vulnerability (CWE-787) affecting Adobe DNG SDK versions 1.7.1 2410 and earlier. Published on 2026-02-10, the issue carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and could result in arbitrary code execution in the context of the current user.
Exploitation requires local access and user interaction, where a victim must open a malicious file. An attacker needs no privileges and faces low complexity to trick a user into processing the file, potentially achieving high impacts on confidentiality, integrity, and availability through arbitrary code execution.
Adobe's security bulletin APSB26-23 details the vulnerability and mitigation: https://helpx.adobe.com/security/products/dng-sdk/apsb26-23.html.
Details
- CWE(s)