Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & CEO at Quantum Infinite Solutions Group Ltd.

Hackers Exploit Adobe Reader 0-Day Vulnerability in the Wild

May 12, 2021

Adobe has launched Patch Tuesday updates for the month of Could with fixes for a number of vulnerabilities spanning 12 completely different merchandise, together with a zero-day flaw affecting Adobe Reader that is actively exploited within the wild.

The listing of up to date functions contains Adobe Experience Manager, Adobe InDesign, Adobe Illustrator, Adobe InCopy, Adobe Genuine Service, Adobe Acrobat and Reader, Magento, Adobe Creative Cloud Desktop Software, Adobe Media Encoder, Adobe After Effects, Adobe Medium, and Adobe Animate.

password auditor

In a safety bulletin, the corporate acknowledged it obtained studies that the flaw “has been exploited within the wild in restricted assaults focusing on Adobe Reader customers on Home windows.” Tracked as CVE-2021-28550, the zero-day considerations an arbitrary code execution flaw that might enable adversaries to execute nearly any command on the right track techniques.

Whereas the focused assaults took intention at Home windows customers of Adobe Reader, the difficulty impacts each Home windows and macOS variations of Acrobat DC, Acrobat Reader DC, Acrobat 2020, Acrobat Reader 2020, Acrobat 2017, and Acrobat Reader 2017. An nameless researcher has been credited with reporting the vulnerability.

10 crucial and 4 vital vulnerabilities have been addressed in Adobe Acrobat and Reader, adopted by remediation for 5 crucial flaws (CVE-2021-21101-CVE-2021-21105) in Adobe Illustrator that might result in arbitrary code execution within the context of the present consumer. Adobe credited Kushal Arvind Shah of Fortinet’s FortiGuard Labs with reporting three of the 5 vulnerabilities.

In all, a complete of 43 safety weaknesses have been resolved in Tuesday’s replace. Customers are suggested to replace their software program installations to the newest variations to mitigate the chance related to the failings.

Posted in SecurityTags:
Write a comment