Adobe has addressed 14 vulnerabilities in its Acrobat products, including critical flaws that can be exploited by attackers for arbitrary code execution.
The vulnerabilities impact the Windows and macOS versions of Acrobat DC, Acrobat Reader DC, Acrobat 2020, Acrobat Reader 2020, Acrobat 2017, and Acrobat Reader 2017.
“Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical, important and moderate vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user.” reads the advisory published by the company.
The following four vulnerabilities have been rated as critical severity:
The flaws have been described as improper access control, improper input validation, signature verification bypass, security feature bypass, and race condition.
The software giant also fixed moderate-severity vulnerabilities (CVE-2020-24439, CVE-2020-24426, CVE-2020-24434, CVE-2020-24438) that can lead to information disclosure.
The flaws were reported by independent researchers and experts from Cisco Talos, Computest, Danish Cyber Defence, Qihoo 360, Star Lab and Ruhr University Bochum, and Tencent,.
The good news is that Adobe is not aware of any attacks in the wild exploiting these vulnerabilities and does not expect them to be exploited soon.
(SecurityAffairs – hacking, Adobe)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.