Software maker Adobe has rolled out its first batch of security patches for 2023 with fixes for at least 29 security vulnerabilities in a range of enterprise-facing products.
The most prominent update, for the widely deployed Adobe Acrobat and Reader software, fixes critical-severity flaws that expose Windows and macOS users to code execution attacks.
According to an advisory from Adobe’s PSIRT, the security issues affect Acrobat DC, Acrobat Reader DC, Acrobat 2020 and Acrobat Reader 2020.
“These updates address critical and important vulnerabilities. Successful exploitation could lead to application denial-of-service, arbitrary code execution, privilege escalation and memory leak,” Adobe said.
The company documented 15 distinct security flaws in the Acrobat and Reader software and urged users to apply the available updates immediately.
Adobe also rolled out fixes for critical-rated flaws in the Adobe InDesign product, warning that successful exploitation could lead to arbitrary code execution, application denial-of-service and memory leaks.
The six documented Adobe InDesign vulnerabilities affect users on both Windows and macOS platforms.
Adobe’s Patch Tuesday rollout also includes patches for serious flaws in Adobe InCopy and Adobe Dimension. These flaws could expose Windows and macOS users to arbitrary code execution and memory leaks.
The company said it was not aware of any exploits in the wild for any of the issues addressed in this batch of updates.
Related: Zoom Patches High Risk Flaws on Windows, MacOS Platforms
Related: ICS Patch Tuesday Debuts With Warnings From Siemens, Schneider
Related: GitHub Introduces Automatic Vulnerability Scanning Feature

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
More from Ryan Naraine
- VMware Confirms Exploit Code Released for Critical vRealize Logging Vulnerabilities
- Gem Security Gets $11 Million Seed Investment for Cloud Incident Response Platform
- Ransomware Leads to Nantucket Public Schools Shutdown
- Sentra Raises $30 Million for DSPM Technology
- Saviynt Raises $205M; Founder Rejoins as CEO
- OpenVEX Spec Adds Clarity to Supply Chain Vulnerability Warnings
- Tenable Launches $25 Million Early-Stage Venture Fund
- VMware Plugs Critical Code Execution Flaws
Latest News
- Fraudulent “CryptoRom” Apps Slip Through Apple and Google App Store Review Process
- US Downs Chinese Balloon Off Carolina Coast
- Microsoft: Iran Unit Behind Charlie Hebdo Hack-and-Leak Op
- Feds Say Cyberattack Caused Suicide Helpline’s Outage
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
