October 10, 2023 at 01:12PM – Patch Tuesday: Code Execution Flaws in Adobe Commerce, Photoshop

October 10, 2023 at 01:12PM

Adobe has released patches for 13 security vulnerabilities in its products. Critical flaws in Adobe Commerce and Photoshop require immediate attention. The flaws could lead to arbitrary code execution, privilege escalation, and denial-of-service attacks. The affected software versions include Adobe Commerce and Magento Open Source. Adobe has also fixed a critical flaw in Photoshop that could allow code execution attacks. Patches are available for Adobe Bridge vulnerabilities as well. No known exploits for these vulnerabilities currently exist.

In a recent meeting, Adobe announced the release of security fixes for 13 vulnerabilities in their software products. They specifically highlighted critical flaws in Adobe Commerce and Photoshop that would require immediate attention.

Adobe noted that successful exploitation of these vulnerabilities could lead to various consequences such as arbitrary code execution, privilege escalation, arbitrary file system read, security feature bypass, and application denial-of-service. The affected software versions are Adobe Commerce (including versions 2.4.7-beta1 and earlier) and Magento Open Source (including versions 2.4.7-beta1 and earlier).

It is important to note that Adobe is not aware of any exploits for these vulnerabilities at present.

Additionally, Adobe released updates to address a critical-severity flaw in Adobe Photoshop. This vulnerability, identified as CVE-2023-26370, could potentially be exploited for code execution attacks on both Windows and macOS systems. The patches apply to Photoshop 2022 (including versions 23.5.5 and earlier) and Photoshop 2023 (including versions 24.7 and earlier).

Furthermore, Adobe’s security response team provided fixes for two vulnerabilities in Adobe Bridge that could be exploited for memory corruption.

These updates are crucial for ensuring the security and stability of Adobe’s software. It is recommended to promptly install the necessary patches and updates to address these vulnerabilities.

Full Article – https://ift.tt/itp4HGS