Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Adobe Patches Reader Vulnerability Exploited in the Wild

Adobe on Tuesday announced the availability of patches for 50 vulnerabilities across six of its products, including a zero-day vulnerability in Reader that has been exploited in the wild.

Adobe on Tuesday announced the availability of patches for 50 vulnerabilities across six of its products, including a zero-day vulnerability in Reader that has been exploited in the wild.

The exploited vulnerability is tracked as CVE-2021-21017 and it was reported to Adobe anonymously. The software giant said it received a report that the flaw has been “exploited in the wild in limited attacks targeting Adobe Reader users on Windows.”

Little information has been shared about the zero-day vulnerability, but Adobe says it’s a heap-based buffer overflow that allows arbitrary code execution.

The last time Adobe patched an actively exploited zero-day vulnerability in Reader was in 2018.

An additional 22 vulnerabilities have been patched in Acrobat and Reader, including 16 critical issues that can be exploited for code execution. The remaining flaws can lead to privilege escalation and information disclosure.

Updates for the Magento e-commerce platform fix 18 vulnerabilities, but only three of them can be exploited without authentication and without admin privileges, including reflected and stored XSS bugs, and an IDOR issue that can allow an attacker to access restricted resources. However, only the stored XSS has been classified as critical.

Advertisement. Scroll to continue reading.

In Photoshop, Adobe patched five critical memory corruption issues that can lead to arbitrary code execution, and in Animate the company resolved one such vulnerability. Two critical code execution flaws were patched in Illustrator.

In Dreamweaver, the company fixed one information disclosure issue.

Adobe says it’s not aware of any attacks exploiting the vulnerabilities in Magento, Photoshop, Animate, Illustrator and Dreamweaver, and, based on the assigned priority ratings, it does not expect them to be targeted.

Related: Hackers Target Two Unpatched Flaws in Windows Adobe Type Manager Library

Related: Adobe Patches 14 Vulnerabilities in Acrobat Products

Related: Weak ACLs in Adobe ColdFusion Allow Privilege Escalation

Related: Unofficial Patch Released for Adobe Reader Zero-Day

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.