February 2024 Adobe Security Update: Over 30 Vulnerabilities Fixed Across Multiple Products, Including Critical Fixes

Contact Us

×

Get a Free Consultation

In its most recent Patch Tuesday security update, Adobe has proactively addressed a significant array of vulnerabilities, surpassing 30 in number, across a spectrum of its products. These updates underscore Adobe’s commitment to fortifying its software against emerging threats and ensuring user safety.

Critical vulnerabilities have been unearthed in several flagship products, including Adobe Acrobat and Reader, Adobe Commerce, Magento Open Source, Substance 3D Painter, and FrameMaker. The identification of such critical flaws highlights the necessity for swift action to mitigate potential risks to users and their systems.

Notably, Adobe has diligently resolved 13 vulnerabilities within Adobe Acrobat and Reader alone. These vulnerabilities span a spectrum of risks, from arbitrary code execution to application denial of service and memory leaks. Such vulnerabilities pose serious threats to system integrity and user data security.

The advisory released by Adobe underscores the urgency of these updates, emphasizing the gravity of the vulnerabilities addressed. Adobe urges users to promptly install the security update for Adobe Acrobat and Reader on both Windows and macOS platforms. Failure to do so may leave systems vulnerable to exploitation, potentially leading to severe consequences such as arbitrary code execution, application denial-of-service, and memory leaks.

By issuing these comprehensive security updates, Adobe continues to demonstrate its unwavering commitment to safeguarding users against evolving cyber threats. These proactive measures not only enhance the security posture of Adobe’s products but also inspire confidence among its user base, ensuring a safer digital experience for all.

Here is the compilation of vulnerabilities that the software vendor has resolved:

Vulnerability Category Vulnerability Impact Severity CVSS base score CVSS vector CVE Number
Out-of-bounds Write (CWE-787) Arbitrary code execution Critical 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20726
Out-of-bounds Write (CWE-787) Arbitrary code execution Critical 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20727
Out-of-bounds Write (CWE-787) Arbitrary code execution Critical 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20728
Use After Free (CWE-416) Arbitrary code execution Important 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20729
Integer Overflow or Wraparound (CWE-190) Arbitrary code execution Critical 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20730
Use After Free (CWE-416) Arbitrary code execution Critical 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20731
Improper Input Validation (CWE-20) Application denial-of-service Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2024-20733
Use After Free (CWE-416) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20734
Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20735
Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20736
Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20747
Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20748
Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20749

Here are the vulnerabilities that have been addressed by the software firm, affecting Adobe Commerce and Magento Open Source products:

Vulnerability Category Vulnerability Impact Severity Authentication required to exploit? Exploit requires admin privileges? CVSS base score CVSS vector CVE number(s)
Cross-site Scripting (Stored XSS) (CWE-79) Arbitrary code execution Critical Yes Yes 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVE-2024-20719
Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78) Arbitrary code execution Critical Yes Yes 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVE-2024-20720
Uncontrolled Resource Consumption (CWE-400) Application denial-of-service Important Yes Yes 5.7 CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:N/A:H CVE-2024-20716
Cross-site Scripting (Stored XSS) (CWE-79) Arbitrary code execution Important Yes Yes 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVE-2024-20717
Cross-Site Request Forgery (CSRF) (CWE-352) Security feature bypass Moderate Yes No 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVE-2024-20718

As per the advisory, the vulnerabilities mentioned above can only be exploited by an authenticated attacker.

The advisory states, “Exploit requires admin privileges: The vulnerability is (or is not) only exploitable by an attacker with administrative privileges.”

Fortunately, the software vendor has not detected any attacks in the wild exploiting these vulnerabilities.

In February 2024, Microsoft’s Patch Tuesday security updates resolved a total of 72 vulnerabilities, including two actively exploited zero-days.

These vulnerabilities impact various Microsoft products and components, including Microsoft Windows and Windows Components, Office and Office Components, Azure, .NET Framework and ASP.NET, SQL Server, Windows Hyper-V, and Microsoft Dynamics.

Of these vulnerabilities, five are classified as Critical, 65 as Important, and two as Moderate in severity.

About Author

Picture of Syed Hassan Raza Rizvi

Syed Hassan Raza Rizvi

Hassan Raza is a seasoned SEO expert with over a decade of industry experience. Proficient in SEO, SEM, and digital marketing, he excels in driving online success for businesses. With a passion for writing about cutting-edge technology, AI trends, and eCommerce platforms such as Magento and BigCommerce, Hassan is a digital marketer by day and a tech enthusiast by night. His expertise and enthusiasm for digital trends make him a valuable asset in navigating the ever-evolving landscape of online marketing.

Table of Contents

Related Blogs

Magento Performance Optimization: 12 Proven Ways to Speed Up Your Store (2025)
Magento

Magento Performance Optimization: 12 Proven Ways to Speed Up Your Store (2025)

In today’s fast-paced e-commerce landscape, website speed directly impacts your bottom line—every second counts when customers browse your online store. If your Magento site takes too long to load, potential buyers will abandon their carts before completing purchases. Magento performance optimization has become essential for online retailers who want to stay competitive. Studies consistently show

Read More
Magento AI: Best Extensions, Tools & Trends to Grow Your Store in 2025
Magento

Magento AI: Best Extensions, Tools & Trends to Grow Your Store in 2025

The global AI market is set to reach $757.58 billion in 2025, with Generative AI spending projected to grow by 76.4%. For Magento (Adobe Commerce) stores processing over $155 billion in annual merchandise value, this isn’t just a trend—it’s a strategic imperative.  The question isn’t whether to adopt AI, but how to do it effectively.

Read More
Shopify Plus vs Magento 2: Complete 2025 Comparison Guide
Magento

Shopify Plus vs Magento 2: Complete 2025 Comparison Guide

Choosing between Shopify Plus vs Magento 2 can make or break your e-commerce success. Both platforms dominate the enterprise space, but they serve vastly different business needs. This guide breaks down the key differences to help you select the right platform for your online store in 2025. The e-commerce platform decision impacts everything: time to

Read More