Wednesday, February 26, 2025
HomeCyber Security News75 Vulnerabilities Fixed with Adobe Security Updates for February 2019

75 Vulnerabilities Fixed with Adobe Security Updates for February 2019

Published on

SIEM as a Service

Follow Us on Google News

Adobe has released security updates that cover updates for Adobe Acrobat and Reader, ColdFusion and Creative Cloud Desktop Application.

The security updates cover 75 vulnerabilities out of them 71 resides with the Adobe Acrobat and Reader itself.

Adobe Acrobat and Reader

With the security update adobe patched 71 vulnerabilities Adobe Acrobat and Reader for Windows and MacOS. The updates cover critical and important vulnerabilities.

An attacker could exploit the vulnerability to run arbitrary code on the infected machine in the context of the current user.   

Affected Versions

Acrobat DC    2019.010.20069 and earlier versions 
Acrobat Reader DC 2019.010.20069 and earlier versions
Acrobat 2017 Classic 2017 2017.011.30113 and earlier version
Acrobat Reader 2017 Classic 2017 2017.011.30113 and earlier version
Acrobat DC Classic 2015 2015.006.30464 and earlier versions
Acrobat Reader DC Classic 2015 2015.006.30464 and earlier version

Users are recommended to update with the following versions.

 Acrobat DC        2019.010.20091
Acrobat Reader DC 2019.010.20091
Acrobat 2017 Classic 2017 2017.011.30120
Acrobat Reader DC 2017 Classic 2017 2017.011.30120
Acrobat DC Classic 2015 2015.006.30475
Acrobat Reader DC Classic 2015 2015.006.30475

You can find the complete vulnerability details and CVE in the Adobe advisory.

ColdFusion

The updates cover ColdFusion versions 2018, 2016 and 11, successful exploitation of the vulnerability leads to arbitrary code execution.

ColdFusion 2018    Update 1 and earlier versions   
ColdFusion 2016 Update 7 and earlier versions
ColdFusion 11 Update 15 and earlier versions

Newest versions

ColdFusion 2018      Update 2
ColdFusion 2016 Update 8
ColdFusion 11 Update 16

Creative Cloud Desktop

The security update for Creative Cloud Desktop Application  installer  for Windows resolves the  insecure library  loading  vulnerability in the installer  that could lead to  privilege  escalation, reads the advisory.

Affected version

Creative Cloud Desktop Application (installer)      4.7.0.400 and earlier versions

Fixed Version

Creative Cloud Desktop Application (installer)    4.8.0.410

Related Read

Adobe Released Security Patches for Digital Editions and Connect

87 Vulnerabilities Fixed With Adobe December Security Update for Acrobat and Reader

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...