Security Experts:

Adobe Patch Tuesday: Code Execution Flaws in Acrobat, Reader

Software maker Adobe has released patches for at least 25 documented security vulnerabilities that expose Windows and macOS users to malicious hacker attacks.

The most urgent fix affects the ubiquitous Adobe Acrobat and Reader software used to create, view and manage PDF files across platforms.

“These [Acrobat and Reader] updates address multiple critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution and memory leak,” Adobe said in a critical-severity advisory released Tuesday.

The Adobe Reader and Acrobat bulletin documents seven distinct vulnerabilities, noting that the majority are related to memory safety issues.

Adobe said it was not aware of any exploits in the wild for any of the patched vulnerabilities.

The company also released security fixes for another seven vulnerabilities in the Adobe Commerce and Magento Open Source online shopping software. Adobe’s bulletin warns that successful exploitation of these bugs could lead to arbitrary code execution, privilege escalation and security feature bypass.

Adobe also released a bulletin with details on a quartet of security defects in the Adobe Illustrator 2022 software. The company said the patch is available for Windows and macOS users and resolves critical and important vulnerabilities that could lead to arbitrary code execution and memory leaks.

This month’s batch of patches also includes fixes for code execution and memory leak flaws in Adobe FrameMaker and privilege escalation issues in Adobe Premiere Elements.

Related: Adobe Warns of 'Critical' Security Flaws in Enterprise Products

Related: Adobe Patch Tuesday: Critical Flaws in Acrobat, Reader

Related: Adobe Plugs 46 Security Flaws on Patch Tuesday

view counter
Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. Ryan is a veteran cybersecurity strategist who has built security engagement programs at major global brands, including Intel Corp., Bishop Fox and GReAT. He is a co-founder of Threatpost and the global SAS conference series. Ryan's past career as a security journalist included bylines at major technology publications including Ziff Davis eWEEK, CBS Interactive's ZDNet, PCMag and PC World. Ryan is a director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world. Follow Ryan on Twitter @ryanaraine.