Contents:
Yesterday, American multinational computer software company Adobe has published a huge Patch Tuesday security updates release that fixes vulnerabilities in Adobe programs such as Dimension, Illustrator, Framemaker, Acrobat, Reader, and Bridge.
Below you can find the full list of Adobe Products that received security updates yesterday and the number of fixed vulnerabilities. In total, Adobe fixed 28 vulnerabilities.
All the updates address a critical vulnerability. Successful exploitation of these flaws could lead to arbitrary code execution enabling cybercriminals to perform commands on susceptible devices.
- APSB21-40 | Adobe Dimension: 1 Critical vulnerability was fixed.
- APSB21-42 | Adobe Illustrator: 2 Critical and 1 Important vulnerability was fixed.
- APSB21-45 | Adobe Framemaker: 1 Critical vulnerability was fixed.
- APSB21-51 | Adobe Acrobat and Reader: 14 Critical and 5 Important vulnerabilities were fixed.
- APSB21-53 | Adobe Bridge: 4 Critical and one Moderate vulnerabilities were fixed.
Adobe Acrobat and Reader were the programs that had the most fixes, with 19 vulnerabilities: 14 Critical and 5 Important.
Adobe recommends users to immediately update their software installations to the newest versions by following the instructions below. The latest product versions are available to end-users via one of the following methods:
- Users can update their product installations manually by choosing Help > Check for Updates.
- The products will update automatically, without requiring user intervention, when updates are detected.
- The full Acrobat Reader installer can be downloaded from the Acrobat Reader Download Center.
For IT administrators (managed environments):
- Refer to the specific release note version for links to installers.
- Install updates via your preferred methodologies, such as AIP-GPO, bootstrapper, SCUP/SCCM (Windows), or on macOS, Apple Remote Desktop, and SSH.
Customers are urged to do so because cybercriminals can compare older versions of the software with the patched versions to discover what code is vulnerable and generate exploits to target these vulnerabilities.