Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Adobe Patches 52 Vulnerabilities in 10 Products

While none of the flaws have been exploited in the wild, many of them could lead to arbitrary code execution.

Adobe vulnerabilities

Adobe on Tuesday announced the release of patches for 52 vulnerabilities across 10 products, including critical-severity bugs that could lead to code execution and privilege escalation.

More than half of the weaknesses Adobe addressed this month could be exploited for arbitrary code execution. Application denial-of-service (DoS) was the second most common type of resolved issue.

When it comes to the severity of the resolved vulnerabilities, the Adobe Connect update takes the lead. It addresses two critical-severity flaws that could be exploited for arbitrary code execution (CVE-2026-34659, CVSS score of 9.6) and privilege escalation (CVE-2026-34660, CVSS score of 9.3).

This month’s update for Adobe Commerce resolves the largest number of security defects across the board. Content Authenticity SDK comes in second, with patches for 14 flaws.

Adobe resolved ten high-severity and five medium-severity bugs with the Commerce update. The issues could be exploited to bypass security features, cause DoS conditions, and execute arbitrary code.

All the security defects resolved in Content Authenticity SDK, one high and 13 medium-severity, could lead to application DoS.

Advertisement. Scroll to continue reading.

High-severity code execution issues were also resolved in After Effects (4 vulnerabilities), Premiere Pro (3 flaws), Media Encoder (2), Substance 3D Painter (2), and Substance 3D Sampler (1).

The update for Illustrator resolves two high-severity code execution defects and two medium-severity issues leading to DoS and memory exposure. Of the five medium-severity weaknesses patched in Substance 3D Designer, four could lead to code execution and one to arbitrary file system read.

Adobe assigned a priority rating of 2 to the Commerce update because the product has previously been targeted in attacks. The remaining updates have a priority rating of 3.

The company says it is not aware of any of these vulnerabilities being exploited in the wild. Additional information can be found on Adobe’s PSIRT page.

Related: Apple Patches Dozens of Vulnerabilities in macOS, iOS

Related: SAP Patches Critical S/4HANA, Commerce Vulnerabilities

Related: Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover

Related: Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.