Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Adobe Releases Emergency Patch for Exploited Commerce Zero-Day

Adobe released an emergency advisory on Sunday to inform Commerce and Magento users of a critical zero-day vulnerability that has been exploited in attacks.

Adobe released an emergency advisory on Sunday to inform Commerce and Magento users of a critical zero-day vulnerability that has been exploited in attacks.

The flaw, tracked as CVE-2022-24086 and assigned a CVSS score of 9.8, has been described as an improper input validation issue that can lead to arbitrary code execution. Adobe says the vulnerability can be exploited without authentication.

The security hole affects the Magento open source and Adobe Commerce e-commerce platforms, specifically versions 2.4.3-p1 and earlier and 2.3.7-p2 and earlier. Adobe has developed patches, which are delivered as MDVA-43395_EE_2.4.3-p1_v1.

The software giant says “CVE-2022-24086 has been exploited in the wild in very limited attacks targeting Adobe Commerce merchants.”

No other information has been provided about the attacks and Adobe has not credited anyone for reporting the vulnerability.

Adobe told SecurityWeek that it cannot share additional details about the vulnerability to protect the security and privacy of its customers.

The company said the issue was discovered by its internal security team. Our internal Adobe security team employs technologies that regularly monitor and help us identify and respond when issues occur.” 

E-commerce software vulnerabilities are typically targeted in mass attacks. One recent example involved more than 500 online stores powered by Magento 1 targeted by cybercriminals whose goal was to plant web skimmers designed to harvest user data. The attackers exploited a combination of flaws and leveraged the fact that Magento 1 no longer receives security updates.

Advertisement. Scroll to continue reading.

Ever since Adobe killed Flash, there have only been a few vulnerabilities in the company’s products that have been exploited in attacks. However, security bugs in Adobe products are still valuable.

Last month, Adobe patched Acrobat and Reader flaws that earned researchers $150,000 at China’s Tianfu Cup hacking contest, which took place in October 2021.

*updated with information from Adobe on who discovered the vulnerability 

Related: Adobe Patches 13 Vulnerabilities in Illustrator

Related: Adobe Patches Gaping Security Flaws in 14 Software Products

Related: Adobe Joins Security Patch Tuesday Frenzy

Related: Adobe Patches Critical RoboHelp Server Security Flaw

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

DARPA veteran Dan Kaufman has joined Badge as SVP, AI and Cybersecurity.

Kelly Shortridge has been promoted to VP of Security Products at Fastly.

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.