Adobe fixes critical security vulnerabilities in Lightroom, Prelude

Adobe has released security updates that address an actively exploited vulnerability in Adobe Reader and other critical bugs in Adobe Acrobat, Magento, Photoshop, Animate, Illustrator, and Dreamweaver.

In total, the company addressed fifty security vulnerabilities affecting seven products, with many of them rated as critical as they allow local arbitrary code execution.

The Adobe Reader bug known to be actively exploited in the wild is tracked as CVE-2021-21017. This vulnerability is a buffer overflow bug that would allow a malicious website to perform remote code execution on the vulnerable computer.

Code execution bugs are the most serious as they could allow attackers to execute almost any command in Windows, including installing malware or taking over the computer.

In addition to the actively exploited Reader vulnerability, Adobe also fixed other critical vulnerabilities in their products, including:

Adobe advises customers using vulnerable products to update to the latest versions as soon as possible to block attacks that could lead to successful exploitation of unpatched installations.

In most cases, users can update their software by using the auto-update feature of the product using the following steps:

  • By going to Help > Check for Updates.
  • The full update installers can be downloaded from Adobe's Download Center.
  • Let the products update automatically, without requiring user intervention, when updates are detected.

Other products, like Magento, may require a user to install the security patch manually.

Related Articles:

Palo Alto Networks fixes zero-day exploited to backdoor firewalls

Google fixes one more Chrome zero-day exploited at Pwn2Own

Google fixes Chrome zero-days exploited at Pwn2Own 2024

Mozilla fixes two Firefox zero-day bugs exploited at Pwn2Own

Apple fixes two new iOS zero-days exploited in attacks on iPhones