×



















    Get a Free Consultation

    Search for:

    February 2024 Adobe Security Update: Over 30 Vulnerabilities Fixed Across Multiple Products, Including Critical Fixes

    Last Updated | February 26, 2024

    In its most recent Patch Tuesday security update, Adobe has proactively addressed a significant array of vulnerabilities, surpassing 30 in number, across a spectrum of its products. These updates underscore Adobe’s commitment to fortifying its software against emerging threats and ensuring user safety.

    Critical vulnerabilities have been unearthed in several flagship products, including Adobe Acrobat and Reader, Adobe Commerce, Magento Open Source, Substance 3D Painter, and FrameMaker. The identification of such critical flaws highlights the necessity for swift action to mitigate potential risks to users and their systems.

    Notably, Adobe has diligently resolved 13 vulnerabilities within Adobe Acrobat and Reader alone. These vulnerabilities span a spectrum of risks, from arbitrary code execution to application denial of service and memory leaks. Such vulnerabilities pose serious threats to system integrity and user data security.

    The advisory released by Adobe underscores the urgency of these updates, emphasizing the gravity of the vulnerabilities addressed. Adobe urges users to promptly install the security update for Adobe Acrobat and Reader on both Windows and macOS platforms. Failure to do so may leave systems vulnerable to exploitation, potentially leading to severe consequences such as arbitrary code execution, application denial-of-service, and memory leaks.

    By issuing these comprehensive security updates, Adobe continues to demonstrate its unwavering commitment to safeguarding users against evolving cyber threats. These proactive measures not only enhance the security posture of Adobe’s products but also inspire confidence among its user base, ensuring a safer digital experience for all.

    Here is the compilation of vulnerabilities that the software vendor has resolved:

    Vulnerability Category Vulnerability Impact Severity CVSS base score CVSS vector CVE Number
    Out-of-bounds Write (CWE-787) Arbitrary code execution Critical 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20726
    Out-of-bounds Write (CWE-787) Arbitrary code execution Critical 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20727
    Out-of-bounds Write (CWE-787) Arbitrary code execution Critical 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20728
    Use After Free (CWE-416) Arbitrary code execution Important 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20729
    Integer Overflow or Wraparound (CWE-190) Arbitrary code execution Critical 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20730
    Use After Free (CWE-416) Arbitrary code execution Critical 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20731
    Improper Input Validation (CWE-20) Application denial-of-service Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2024-20733
    Use After Free (CWE-416) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20734
    Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20735
    Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20736
    Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20747
    Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20748
    Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20749

    Here are the vulnerabilities that have been addressed by the software firm, affecting Adobe Commerce and Magento Open Source products:

    Vulnerability Category Vulnerability Impact Severity Authentication required to exploit? Exploit requires admin privileges? CVSS base score CVSS vector CVE number(s)
    Cross-site Scripting (Stored XSS) (CWE-79) Arbitrary code execution Critical Yes Yes 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVE-2024-20719
    Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78) Arbitrary code execution Critical Yes Yes 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVE-2024-20720
    Uncontrolled Resource Consumption (CWE-400) Application denial-of-service Important Yes Yes 5.7 CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:N/A:H CVE-2024-20716
    Cross-site Scripting (Stored XSS) (CWE-79) Arbitrary code execution Important Yes Yes 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVE-2024-20717
    Cross-Site Request Forgery (CSRF) (CWE-352) Security feature bypass Moderate Yes No 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVE-2024-20718

    As per the advisory, the vulnerabilities mentioned above can only be exploited by an authenticated attacker.

    The advisory states, “Exploit requires admin privileges: The vulnerability is (or is not) only exploitable by an attacker with administrative privileges.”

    Fortunately, the software vendor has not detected any attacks in the wild exploiting these vulnerabilities.

    In February 2024, Microsoft’s Patch Tuesday security updates resolved a total of 72 vulnerabilities, including two actively exploited zero-days.

    These vulnerabilities impact various Microsoft products and components, including Microsoft Windows and Windows Components, Office and Office Components, Azure, .NET Framework and ASP.NET, SQL Server, Windows Hyper-V, and Microsoft Dynamics.

    Of these vulnerabilities, five are classified as Critical, 65 as Important, and two as Moderate in severity.


    folio-social-logo
    About

    Hassan Raza is a seasoned SEO expert with over a decade of industry experience. Proficient in SEO, SEM, and digital marketing, he excels in driving online success for businesses. With a passion for writing about cutting-edge technology, AI trends, and eCommerce platforms such as Magento and BigCommerce, Hassan is a digital marketer by day and a tech enthusiast by night. His expertise and enthusiasm for digital trends make him a valuable asset in navigating the ever-evolving landscape of online marketing.