Multiple Adobe Security Vulnerabilities Let Attackers Execute Arbitrary Code Remotely

by Esmeralda McKenzie
Multiple Adobe Security Vulnerabilities Let Attackers Execute Arbitrary Code Remotely

Multiple Adobe Security Vulnerabilities Let Attackers Execute Arbitrary Code Remotely

More than one Adobe Safety Flaws Let Attackers Earn Distant Code

A product security incident response team (PSIRT) manages a vulnerability disclosure program by performing as a single level of contact for exterior newshounds, including customers, companions, penetration testers, and security researchers.

They offer a standardized job for reporting security vulnerabilities say in the group’s products and products and companies. They prioritize non-public disclosure performed in one diagram that minimizes risk to person recordsdata, the group’s infrastructure, and its popularity.

EHA

Vulnerability Critical capabilities

Safety updates are on hand for Adobe Ride Manager (AEM) to handle serious vulnerabilities that attackers would possibly perhaps exploit to get arbitrary code or bypass security facets, as all versions of AEM Cloud Carrier (CS) and AEM 6.5.19.0 and earlier are affected.

To mitigate the hazards, administrators are suggested to change AEM to both AEM Cloud Carrier Commence 2024.03 or AEM 6.5 Carrier Pack 20.0, both of which deal with the known vulnerabilities.

The safety updates believe been released to handle serious vulnerabilities in Adobe Premiere Pro for Windows and macOS that is also exploited to get arbitrary code on an affected blueprint.

Variations 24.1 and earlier on Windows and macOS, as well to 23.6.2 and earlier on both platforms, are weak. The Creative Cloud desktop app recommends updating to version 24.2.1 (Windows/macOS) or 23.6.4 (Windows/macOS).

Adobe released security updates to handle a important vulnerability in ColdFusion versions 2023 and 2021, which will likely be exploited to study arbitrary file programs.

All ColdFusion 2023 versions earlier than Change 6 and all ColdFusion 2021 versions earlier than Change 12 are affected.

It advises updating ColdFusion to Change 7 for 2023 and Change 13 for 2021 to decrease the risk, which Adobe has ranked as priority 3.

Adobe Bridge versions 13.0.5 and earlier and 14.0.1 and earlier on Windows and macOS additionally consist of a security change to handle serious and necessary vulnerabilities.

Attackers would possibly perhaps exploit the vulnerabilities to get arbitrary code on a sufferer’s machine or trigger a memory leak. Therefore, it’s suggested that you just change to versions 13.0.6 or 14.0.2 thru the Creative Cloud desktop app.

Adobe additionally released a security change to handle a important vulnerability (CVE-2024-20754) in Adobe Lightroom for macOS versions 7.1.2 and earlier, where an attacker would possibly perhaps expend the untrusted search direction vulnerability to get arbitrary code on a sufferer’s laptop, doubtlessly taking whole alter of the blueprint.

To handle serious vulnerabilities in Adobe Animate versions 23.0.3 and earlier, a security change has been released for Windows and macOS, and 24.0 and earlier for Windows and macOS.

Attackers would possibly perhaps seize revenue of the flaws to whisk arbitrary code or trigger memory leaks on a purpose blueprint, so updating to basically the most popular versions (23.0.4 for 2023 and 24.0.1 for 2024) thru the Creative Cloud desktop app or the Acquire Heart has been suggested.

Source credit : cybersecuritynews.com

Related Posts