Security Experts:

Connect with us

Hi, what are you looking for?



Adobe Releases Emergency Patch for Exploited Commerce Zero-Day

Adobe released an emergency advisory on Sunday to inform Commerce and Magento users of a critical zero-day vulnerability that has been exploited in attacks.

Adobe released an emergency advisory on Sunday to inform Commerce and Magento users of a critical zero-day vulnerability that has been exploited in attacks.

The flaw, tracked as CVE-2022-24086 and assigned a CVSS score of 9.8, has been described as an improper input validation issue that can lead to arbitrary code execution. Adobe says the vulnerability can be exploited without authentication.

The security hole affects the Magento open source and Adobe Commerce e-commerce platforms, specifically versions 2.4.3-p1 and earlier and 2.3.7-p2 and earlier. Adobe has developed patches, which are delivered as MDVA-43395_EE_2.4.3-p1_v1.

The software giant says “CVE-2022-24086 has been exploited in the wild in very limited attacks targeting Adobe Commerce merchants.”

No other information has been provided about the attacks and Adobe has not credited anyone for reporting the vulnerability.

Adobe told SecurityWeek that it cannot share additional details about the vulnerability to protect the security and privacy of its customers.

The company said the issue was discovered by its internal security team. Our internal Adobe security team employs technologies that regularly monitor and help us identify and respond when issues occur.” 

E-commerce software vulnerabilities are typically targeted in mass attacks. One recent example involved more than 500 online stores powered by Magento 1 targeted by cybercriminals whose goal was to plant web skimmers designed to harvest user data. The attackers exploited a combination of flaws and leveraged the fact that Magento 1 no longer receives security updates.

Ever since Adobe killed Flash, there have only been a few vulnerabilities in the company’s products that have been exploited in attacks. However, security bugs in Adobe products are still valuable.

Last month, Adobe patched Acrobat and Reader flaws that earned researchers $150,000 at China’s Tianfu Cup hacking contest, which took place in October 2021.

*updated with information from Adobe on who discovered the vulnerability 

Related: Adobe Patches 13 Vulnerabilities in Illustrator

Related: Adobe Patches Gaping Security Flaws in 14 Software Products

Related: Adobe Joins Security Patch Tuesday Frenzy

Related: Adobe Patches Critical RoboHelp Server Security Flaw

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


Artificial intelligence is competing in another endeavor once limited to humans — creating propaganda and disinformation.


Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack


A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.


A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...


Cybercriminals earned significantly less from ransomware attacks in 2022 compared to 2021 as victims are increasingly refusing to pay ransom demands.