Virtual Event Today: Supply Chain Security Summit - Register Now

Security Experts:

Connect with us

Hi, what are you looking for?



Adobe Releases Emergency Patch for Exploited Commerce Zero-Day

Adobe released an emergency advisory on Sunday to inform Commerce and Magento users of a critical zero-day vulnerability that has been exploited in attacks.

Adobe released an emergency advisory on Sunday to inform Commerce and Magento users of a critical zero-day vulnerability that has been exploited in attacks.

The flaw, tracked as CVE-2022-24086 and assigned a CVSS score of 9.8, has been described as an improper input validation issue that can lead to arbitrary code execution. Adobe says the vulnerability can be exploited without authentication.

The security hole affects the Magento open source and Adobe Commerce e-commerce platforms, specifically versions 2.4.3-p1 and earlier and 2.3.7-p2 and earlier. Adobe has developed patches, which are delivered as MDVA-43395_EE_2.4.3-p1_v1.

The software giant says “CVE-2022-24086 has been exploited in the wild in very limited attacks targeting Adobe Commerce merchants.”

No other information has been provided about the attacks and Adobe has not credited anyone for reporting the vulnerability.

Adobe told SecurityWeek that it cannot share additional details about the vulnerability to protect the security and privacy of its customers.

The company said the issue was discovered by its internal security team. Our internal Adobe security team employs technologies that regularly monitor and help us identify and respond when issues occur.” 

E-commerce software vulnerabilities are typically targeted in mass attacks. One recent example involved more than 500 online stores powered by Magento 1 targeted by cybercriminals whose goal was to plant web skimmers designed to harvest user data. The attackers exploited a combination of flaws and leveraged the fact that Magento 1 no longer receives security updates.

Ever since Adobe killed Flash, there have only been a few vulnerabilities in the company’s products that have been exploited in attacks. However, security bugs in Adobe products are still valuable.

Last month, Adobe patched Acrobat and Reader flaws that earned researchers $150,000 at China’s Tianfu Cup hacking contest, which took place in October 2021.

*updated with information from Adobe on who discovered the vulnerability 

Related: Adobe Patches 13 Vulnerabilities in Illustrator

Related: Adobe Patches Gaping Security Flaws in 14 Software Products

Related: Adobe Joins Security Patch Tuesday Frenzy

Related: Adobe Patches Critical RoboHelp Server Security Flaw

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.