Software maker Adobe has rolled out its first batch of security patches for 2023 with fixes for at least 29 security vulnerabilities in a range of enterprise-facing products.
The most prominent update, for the widely deployed Adobe Acrobat and Reader software, fixes critical-severity flaws that expose Windows and macOS users to code execution attacks.
According to an advisory from Adobe’s PSIRT, the security issues affect Acrobat DC, Acrobat Reader DC, Acrobat 2020 and Acrobat Reader 2020.
“These updates address critical and important vulnerabilities. Successful exploitation could lead to application denial-of-service, arbitrary code execution, privilege escalation and memory leak,” Adobe said.
The company documented 15 distinct security flaws in the Acrobat and Reader software and urged users to apply the available updates immediately.
Adobe also rolled out fixes for critical-rated flaws in the Adobe InDesign product, warning that successful exploitation could lead to arbitrary code execution, application denial-of-service and memory leaks.
The six documented Adobe InDesign vulnerabilities affect users on both Windows and macOS platforms.
Adobe’s Patch Tuesday rollout also includes patches for serious flaws in Adobe InCopy and Adobe Dimension. These flaws could expose Windows and macOS users to arbitrary code execution and memory leaks.
The company said it was not aware of any exploits in the wild for any of the issues addressed in this batch of updates.
Related: Zoom Patches High Risk Flaws on Windows, MacOS Platforms
Related: ICS Patch Tuesday Debuts With Warnings From Siemens, Schneider
Related: GitHub Introduces Automatic Vulnerability Scanning Feature

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
More from Ryan Naraine
- Tenable Launches $25 Million Early-Stage Venture Fund
- VMware Plugs Critical Code Execution Flaws
- GoTo Says Hackers Stole Encrypted Backups, MFA Settings
- Apple Patches WebKit Code Execution in iPhones, MacBooks
- Thoma Bravo to Buy Magnet Forensics in $1.3B Transaction
- T-Mobile Says Hackers Used API to Steal Data on 37 Million Accounts
- Chainguard Trains Spotlight on SBOM Quality Problem
- Exploited Control Web Panel Flaw Added to CISA ‘Must-Patch’ List
Latest News
- Russian Millionaire on Trial in Hack, Insider Trade Scheme
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Vulnerabilities in OpenEMR Healthcare Software Expose Patient Data
- Russia-Linked APT29 Uses New Malware in Embassy Attacks
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
