Yesterday, American multinational computer software company Adobe has published a huge Patch Tuesday security updates release that fixes vulnerabilities in Adobe programs such as Dimension, Illustrator, Framemaker, Acrobat, Reader, and Bridge.

Below you can find the full list of Adobe Products that received security updates yesterday and the number of fixed vulnerabilities. In total, Adobe fixed 28 vulnerabilities.

All the updates address a critical vulnerability. Successful exploitation of these flaws could lead to arbitrary code execution enabling cybercriminals to perform commands on susceptible devices.

Adobe Acrobat and Reader were the programs that had the most fixes, with 19 vulnerabilities: 14 Critical and 5 Important.

Adobe recommends users to immediately update their software installations to the newest versions by following the instructions below. The latest product versions are available to end-users via one of the following methods:

  • Users can update their product installations manually by choosing Help > Check for Updates.
  • The products will update automatically, without requiring user intervention, when updates are detected.
  • The full Acrobat Reader installer can be downloaded from the Acrobat Reader Download Center.

For IT administrators (managed environments):     

  • Refer to the specific release note version for links to installers.
  • Install updates via your preferred methodologies, such as AIP-GPO, bootstrapper, SCUP/SCCM (Windows), or on macOS, Apple Remote Desktop, and SSH.

Customers are urged to do so because cybercriminals can compare older versions of the software with the patched versions to discover what code is vulnerable and generate exploits to target these vulnerabilities.

Adobe Zero-Day Exploit: Further Details on the Zero-Day Bug Patched in May by Adobe

Security Alert: Surprise Adobe Patch Eliminates Critical Flaw in Acrobat and Reader

Security Alert: Fake Adobe Flash Update Spreads Bad Rabbit Ransomware

Leave a Reply

Your email address will not be published. Required fields are marked *