Adobe has patched a critical arbitrary code execution vulnerability in Flash Player. This is the only flaw fixed by the software giant this Patch Tuesday.
The vulnerability, tracked as CVE-2020-9746, has been described as a NULL pointer dereference issue.
“Successful exploitation could lead to an exploitable crash, potentially resulting in arbitrary code execution in the context of the current user,” Adobe explained in its advisory.
The company noted that exploitation of the vulnerability requires the attacker to insert malicious strings into an HTTP response that is by default delivered over TLS, which makes it more difficult to conduct an attack.
Adobe patched CVE-2020-9746 with the release of Flash Player 32.0.0.445 for Windows, macOS, Linux and Chrome OS.
The company says there is no evidence that the vulnerability has been exploited for malicious purposes, and while the bug has been classified as critical, Adobe has assigned it a priority rating of 2, which means it does not expect it to be exploited any time soon.
“As is typically the case for Flash Player vulnerabilities, web-based exploitation is the primary vector of exploitation but not the only one. These vulnerabilities can also be exploited through an embedded ActiveX control in a Microsoft Office document or any application that uses the IE rendering engine,” Nick Colyer, senior product marketing manager at Automox, told SecurityWeek.
Colyer added, “As a security best practice, remediation of commonly exploitable or recurring threat vectors is always strongly encouraged. For organizations that cannot remove Adobe Flash due to a business-critical function, it is recommended to mitigate the threat potential of these vulnerabilities by preventing Adobe Flash Player from running altogether via the killbit feature, set a Group Policy to turn off instantiation of Flash objects, or limit trust center settings prompting for active scripting elements.”
Flash Player will reach end of support on December 31 and it will no longer receive security updates. Browser makers have started taking action, and Microsoft announced recently that Flash will be removed from the new Edge browser by January 2021.
Related: Adobe Patches Critical Code Execution Flaws in AEM, FrameMaker, InDesign
Related: Adobe Patches Critical Vulnerabilities in Media Encoder, Download Manager
Related: Adobe Patches 11 Critical Vulnerabilities in Acrobat and Reader
Related: Adobe Patches Critical Code Execution Flaws in Bridge, Photoshop, Prelude

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
Latest News
- Sentra Raises $30 Million for DSPM Technology
- Cyber Insights 2023: Cyberinsurance
- Cyber Insights 2023: Attack Surface Management
- Cyber Insights 2023: Artificial Intelligence
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- How the Atomized Network Changed Enterprise Protection
- Critical QNAP Vulnerability Leads to Code Injection
