Risk Management

Patch Tuesday: Adobe Warns of Critical Flaws in Widely Deployed Software

Adobe ships patches for at least 30 documented security flaws, warning that users are exposed to code execution, security feature bypass and denial-of-service attacks.

Adobe Acrobat vulnerability exploited

Software maker Adobe on Tuesday released patches for at least 30 documented security flaws in multiple products, warning that users are exposed to code execution, security feature bypass and application denial-of-service attacks.

As part of its scheduled Patch Tuesday releases, Adobe called urgent attention to critical flaws in the Adobe Acrobat and Reader, Adobe Commerce and Magento Open Source, Substance 3D Painter, and FrameMaker.

Adobe documented at least 13 serious security defects covered in the Adobe Acrobat and Reader update and warned that both Windows and macOS users are at risk.

“Successful exploitation could lead to arbitrary code execution, application denial-of-service, and memory leak,” Adobe said.  

The company also flagged the Adobe Commerce update for urgent attention, warning that unpatched installations are at risk of arbitrary code execution, security feature bypass and application denial-of-service.

Adobe also rolled out fixes for code execution bugs in Adobe Substance 3D Painter, Adobe FrameMaker Publishing Server, Adobe Audition, and Adobe Substance 3D Designer.

The company said it was not aware of any exploits in the wild for any of the issues addressed in the February batch of patches.

Related: Fortinet Warns of New FortiOS Zero-Day

Advertisement. Scroll to continue reading.

Related: Exploitation of Another Ivanti VPN Vulnerability Observed

Related: ICS Patch Tuesday: Siemens Addresses 270 Vulnerabilities

Related: CISA Warns of Roundcube Webmail Vulnerability Exploitation

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version