Adobe Patch Tuesday security updates released by Adobe addressed over 30 vulnerabilities across various products, including critical issues.
The software maker warned of critical flaws in popular products such as Adobe Acrobat and Reader, Adobe Commerce and Magento Open Source, Substance 3D Painter, and FrameMaker.
The company fixed 13 vulnerabilities in the Adobe Acrobat and Reader software, including arbitrary code execution, application denial of service and memory leak vulnerabilities.
“Adobe has released a security update for Adobe Acrobat and Reader for Windows and macOS. This update addresses and vulnerabilities.” . “Successful exploitation could lead to arbitrary code execution, application denial-of-service, and memory leak.”
Below is the list of vulnerabilities addressed by the software vendor:
Vulnerability Category | Vulnerability Impact | Severity | CVSS base score | CVE Number | |
Out-of-bounds Write () | Arbitrary code execution | Critical | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | CVE-2024-20726 |
Out-of-bounds Write () | Arbitrary code execution | Critical | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | CVE-2024-20727 |
Out-of-bounds Write () | Arbitrary code execution | Critical | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | CVE-2024-20728 |
Use After Free () | Arbitrary code execution | Important | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | CVE-2024-20729 |
Integer Overflow or Wraparound () | Arbitrary code execution | Critical | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | CVE-2024-20730 |
Use After Free () | Arbitrary code execution | Critical | 8.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | CVE-2024-20731 |
Improper Input Validation () | Application denial-of-service | Important | 5.5 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | CVE-2024-20733 |
Use After Free () | Memory leak | Important | 5.5 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N | CVE-2024-20734 |
Out-of-bounds Read () | Memory leak | Important | 5.5 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N | CVE-2024-20735 |
Out-of-bounds Read () | Memory leak | Important | 5.5 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N | CVE-2024-20736 |
Out-of-bounds Read () | Memory leak | Important | 5.5 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N | CVE-2024-20747 |
Out-of-bounds Read () | Memory leak | Important | 5.5 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N | CVE-2024-20748 |
Out-of-bounds Read () | Memory leak | Important | 5.5 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N | CVE-2024-20749 |
Below is the list of vulnerabilities addressed by the software firm that impact Adobe Commerce and Magento Open Source products:
According to the advisory, the above vulnerabilities can be exploited only by an authenticated attacker.
“Exploit requires admin privileges: The vulnerability is (or is not) only exploitable by an attacker with administrative privileges.” states the .
The good news is that the software vendor is not aware of attacks in the wild exploiting these vulnerabilities.
Microsoft Patch Tuesday security updates for February 2024 resolved a total of 72 vulnerabilities, including two actively exploited zero-days.
The vulnerabilities affect Microsoft Windows and Windows Components; Office and Office Components; Azure; .NET Framework and ASP.NET; SQL Server; Windows Hyper-V; and Microsoft Dynamics.
Five vulnerabilities are rated Critical, 65 are rated Important, and two are rated Moderate in severity.
Follow me on Twitter: and and Mastodon
(SecurityAffairs – ransomware, Patch Tuesday)