Adobe’s Patch Tuesday security updates for January 2019 address only two “important” vulnerabilities in the company’s Connect and Digital Editions products.
The latest version of the Adobe Connect web conferencing software patches CVE-2018-19718, a session token exposure issue that can lead to the exposure of privileges granted to a session.
In the Digital Editions ebook reader software, Adobe fixed an out-of-bounds read bug that can result in the disclosure of information in the context of the current user. Jaanus Kääp of Clarified Security reported this flaw (CVE-2018-12817) to Adobe.
Adobe says neither of these vulnerabilities have been exploited in the wild and they are unlikely to ever be exploited considering that they are only rated as “important” and have a priority rating of 3. A priority rating of 3 is assigned to products that have historically not been targeted by malicious actors – administrators are advised to install the updates at their discretion.
Adobe also released updates for Flash Player, but they only resolve feature and performance bugs, not any security issues.
These are not the first security updates released by Adobe in 2019. On January 3, the company updated its Acrobat and Reader products to address two critical vulnerabilities that can be exploited for arbitrary code execution and privilege escalation.
Related: Russian Hospital Targeted With Flash Zero-Day After Kerch Incident
Related: Adobe Patches Flash Zero-Day Exploited in Targeted Attacks
Related: Flash Player Update Patches Disclosed Code Execution Flaw
Related: Malicious PDF Leads to Discovery of Adobe Reader, Windows Zero-Days

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- CISA, NSA Issue Guidance for IAM Administrators
- Analysis: SEC Cybersecurity Proposals and Biden’s National Cybersecurity Strategy
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Cisco Patches High-Severity Vulnerabilities in IOS Software
- ‘Nexus’ Android Trojan Targets 450 Financial Applications
- Tackling the Challenge of Actionable Intelligence Through Context
- Dole Says Employee Information Compromised in Ransomware Attack
- Backslash Snags $8M Seed Financing for AppSec Tech
