Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Adobe Patches 38 Flaws in Enterprise Software Products

After skipping last month, Adobe returned to its scheduled Patch Tuesday cadence with the release of fixes for at least 38 vulnerabilities in multiple enterprise-facing products.

The San Jose, California software maker said the flaws could expose users to code execution and privilege escalation attacks across all computer platforms.

After skipping last month, Adobe returned to its scheduled Patch Tuesday cadence with the release of fixes for at least 38 vulnerabilities in multiple enterprise-facing products.

The San Jose, California software maker said the flaws could expose users to code execution and privilege escalation attacks across all computer platforms.

The most serious vulnerabilities affect Adobe Experience Manager (AEM), the content management tool used by corporate marketing teams.  

Adobe said it patched at least 33 flaws in the AEM Cloud Service (Release 2022.10.0) and warned of the risk of serious hacker attacks.

”Successful exploitation of these vulnerabilities could result in arbitrary code execution and security feature bypass,” according to the company’s public documentation.

[ Read: VMware Patches VM Escape Flaw Exploited at Geekpwn Event ]

In a separate bulletin, Adobe said it fixed a privilege escalation issue in the Adobe Campaign Classic (ACC) product and urged Windows and Linux users to apply the available updates.

The company also pushed fixes for a quartet of memory leak issues in the Adobe Illustrator product. Adobe said the issues affect Illustrator 2022 on both Windows and macOS platforms.

The Adobe patches come on the same day virtualization technology giant VMware released urgent updates to fix security problems in multiple software products, including a virtual machine escape bug exploited at the GeekPwn 2022 hacking challenge.

The VM escape flaw, documented as CVE-2022-31705, was exploited by Ant Security researcher Yuhao Jiang on systems running fully patched VMware Fusion, ESXi and Workstation products.  

In a security bulletin issued Tuesday, VMware slapped a CVSS severity rating of 9.3/10 and warned that a malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine’s VMX process running on the host. 

Related: NSA Outs Chinese Hackers Exploiting Citrix Zero-Day

Related: VMware Patches VM Escape Flaw Exploited at Geekpwn Event

Related: Fortinet Ships Emergency Patch for Already-Exploited VPN Flaw

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Nation-State

The North Korean APT tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated by...

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.