Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Adobe Patches Reader Vulnerability Exploited in the Wild

Adobe on Tuesday announced the availability of patches for 50 vulnerabilities across six of its products, including a zero-day vulnerability in Reader that has been exploited in the wild.

Adobe on Tuesday announced the availability of patches for 50 vulnerabilities across six of its products, including a zero-day vulnerability in Reader that has been exploited in the wild.

The exploited vulnerability is tracked as CVE-2021-21017 and it was reported to Adobe anonymously. The software giant said it received a report that the flaw has been “exploited in the wild in limited attacks targeting Adobe Reader users on Windows.”

Little information has been shared about the zero-day vulnerability, but Adobe says it’s a heap-based buffer overflow that allows arbitrary code execution.

The last time Adobe patched an actively exploited zero-day vulnerability in Reader was in 2018.

An additional 22 vulnerabilities have been patched in Acrobat and Reader, including 16 critical issues that can be exploited for code execution. The remaining flaws can lead to privilege escalation and information disclosure.

Updates for the Magento e-commerce platform fix 18 vulnerabilities, but only three of them can be exploited without authentication and without admin privileges, including reflected and stored XSS bugs, and an IDOR issue that can allow an attacker to access restricted resources. However, only the stored XSS has been classified as critical.

In Photoshop, Adobe patched five critical memory corruption issues that can lead to arbitrary code execution, and in Animate the company resolved one such vulnerability. Two critical code execution flaws were patched in Illustrator.

In Dreamweaver, the company fixed one information disclosure issue.

Adobe says it’s not aware of any attacks exploiting the vulnerabilities in Magento, Photoshop, Animate, Illustrator and Dreamweaver, and, based on the assigned priority ratings, it does not expect them to be targeted.

Related: Hackers Target Two Unpatched Flaws in Windows Adobe Type Manager Library

Related: Adobe Patches 14 Vulnerabilities in Acrobat Products

Related: Weak ACLs in Adobe ColdFusion Allow Privilege Escalation

Related: Unofficial Patch Released for Adobe Reader Zero-Day

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.