Adobe on Tuesday announced the availability of patches for 50 vulnerabilities across six of its products, including a zero-day vulnerability in Reader that has been exploited in the wild.
The exploited vulnerability is tracked as CVE-2021-21017 and it was reported to Adobe anonymously. The software giant said it received a report that the flaw has been “exploited in the wild in limited attacks targeting Adobe Reader users on Windows.”
Little information has been shared about the zero-day vulnerability, but Adobe says it’s a heap-based buffer overflow that allows arbitrary code execution.
The last time Adobe patched an actively exploited zero-day vulnerability in Reader was in 2018.
An additional 22 vulnerabilities have been patched in Acrobat and Reader, including 16 critical issues that can be exploited for code execution. The remaining flaws can lead to privilege escalation and information disclosure.
Updates for the Magento e-commerce platform fix 18 vulnerabilities, but only three of them can be exploited without authentication and without admin privileges, including reflected and stored XSS bugs, and an IDOR issue that can allow an attacker to access restricted resources. However, only the stored XSS has been classified as critical.
In Photoshop, Adobe patched five critical memory corruption issues that can lead to arbitrary code execution, and in Animate the company resolved one such vulnerability. Two critical code execution flaws were patched in Illustrator.
In Dreamweaver, the company fixed one information disclosure issue.
Adobe says it’s not aware of any attacks exploiting the vulnerabilities in Magento, Photoshop, Animate, Illustrator and Dreamweaver, and, based on the assigned priority ratings, it does not expect them to be targeted.
Related: Hackers Target Two Unpatched Flaws in Windows Adobe Type Manager Library
Related: Adobe Patches 14 Vulnerabilities in Acrobat Products
Related: Weak ACLs in Adobe ColdFusion Allow Privilege Escalation
Related: Unofficial Patch Released for Adobe Reader Zero-Day

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Cisco to Acquire Splunk for $28 Billion
- Car Cybersecurity Study Shows Drop in Critical Vulnerabilities Over Past Decade
- Omron Patches PLC, Engineering Software Flaws Discovered During ICS Malware Analysis
- Intel Launches New Attestation Service as Part of Trust Authority Portfolio
- Atos Unify Vulnerabilities Could Allow Hackers to Backdoor Systems
- SASE Firm Cato Networks Raises $238 Million at $3 Billion Valuation
- Clorox Blames Damaging Cyberattack for Product Shortage
- Trend Micro Patches Exploited Zero-Day Vulnerability in Endpoint Security Products
Latest News
- Every Network Is Now an OT Network. Can Your Security Keep Up?
- Navigating the Digital Frontier in Cybersecurity Awareness Month 2023
- TransUnion Denies Breach After Hacker Publishes Allegedly Stolen Data
- Legit Security Raises $40 Million in Series B Financing
- Cisco to Acquire Splunk for $28 Billion
- Atlassian Security Updates Patch High-Severity Vulnerabilities
- Car Cybersecurity Study Shows Drop in Critical Vulnerabilities Over Past Decade
- UK’s New Online Safety Law Adds to Crackdown on Big Tech Companies
