Security updates released by Adobe on Tuesday for seven of its products patch a total of 21 vulnerabilities, including 15 flaws that have been assigned a critical severity rating.
Seven vulnerabilities have been addressed in Adobe After Effects for Windows and macOS. Five of them can allow arbitrary code execution and they have been rated critical, but it’s worth noting that they are actually high-severity issues based on their CVSS score. In fact, all flaws rated critical by Adobe have a CVSS score that places them in the high severity range.
The remaining two After Effects flaws have been described as arbitrary file system read issues and they have been assigned a moderate severity rating — low severity based on their CVSS score.
Six vulnerabilities, including five critical arbitrary code execution flaws, have been patched in Adobe Media Encoder for Windows and macOS.
One critical code execution bug and one moderate-severity file system read issue have been patched in Photoshop, and two critical code execution vulnerabilities have been fixed in Adobe Prelude.
An arbitrary code execution vulnerability has also been patched in Character Animator 2020, along with an important-severity privilege escalation issue.
Adobe also released advisories to inform customers about a critical code execution vulnerability in Premiere Pro, and a moderate-severity code execution flaw in the company’s Audition product.
Adobe says it’s not aware of any in-the-wild exploits for the vulnerabilities patched this week, and since all the advisories have a priority rating of 3, the company likely does not expect them to be targeted by malicious actors.
More than half of the vulnerabilities were reported by researchers from Trend Micro’s Zero Day Initiative and China-based Topsec Alpha Team.
Researchers based in China are often credited by Adobe for reporting vulnerabilities in the company’s products. However, China recently introduced a law that requires citizens who find zero-day vulnerabilities to disclose them to the Chinese government and not sell them to any third-party outside of China. While researchers are still allowed to report flaws to the vendors whose products are impacted, the new law could discourage some researchers from doing so.
Related: Adobe Patches Reader Vulnerability Exploited in the Wild
Related: Adobe: Critical Flaws in Reader, Acrobat, Illustrator
Related: Adobe: Windows Users Hit by PDF Reader Zero-Day

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Cisco to Acquire Splunk for $28 Billion
- Car Cybersecurity Study Shows Drop in Critical Vulnerabilities Over Past Decade
- Omron Patches PLC, Engineering Software Flaws Discovered During ICS Malware Analysis
- Intel Launches New Attestation Service as Part of Trust Authority Portfolio
- Atos Unify Vulnerabilities Could Allow Hackers to Backdoor Systems
- SASE Firm Cato Networks Raises $238 Million at $3 Billion Valuation
- Clorox Blames Damaging Cyberattack for Product Shortage
- Trend Micro Patches Exploited Zero-Day Vulnerability in Endpoint Security Products
Latest News
- New ‘Sandman’ APT Group Hitting Telcos With Rare LuaJIT Malware
- Every Network Is Now an OT Network. Can Your Security Keep Up?
- Navigating the Digital Frontier in Cybersecurity Awareness Month 2023
- TransUnion Denies Breach After Hacker Publishes Allegedly Stolen Data
- Legit Security Raises $40 Million in Series B Financing
- Cisco to Acquire Splunk for $28 Billion
- Atlassian Security Updates Patch High-Severity Vulnerabilities
- Car Cybersecurity Study Shows Drop in Critical Vulnerabilities Over Past Decade
