Sunday, February 9, 2025
HomeCVE/vulnerabilityAdobe Fixes 82 Vulnerabilities in Adobe Acrobat and Reader, Experience & Downloader...

Adobe Fixes 82 Vulnerabilities in Adobe Acrobat and Reader, Experience & Downloader Manager

Published on

SIEM as a Service

Follow Us on Google News

Adobe released security updates that cover 82 vulnerabilities in various products, out of 82 vulnerabilities 45 are rated critical and the rest of the vulnerabilities rated as important and moderate.

The security fix covers multiple Adobe products that include Adobe Acrobat and Reader, Adobe Experience Manager & Forms, and Adobe Download Manager.

Adobe Acrobat and Reader

Adobe released security updates for Windows and  macOS, the updates cover critical and  important  vulnerabilities with Adobe Acrobat and Reader.

These vulnerabilities allow an attacker to execute arbitrary code with the vulnerable installations in the context of the current user.

Affected Versions

  • Acrobat DC 2019.012.20040 and earlier versions 
  • Acrobat Reader DC 2019.012.20040 and earlier versions
  • Acrobat 2017 2017.011.30148
  • Acrobat Reader 2017 2017.011.30148 and earlier versions
  • Acrobat 2015 2015.006.30503 and earlier versions 
  • Acrobat Reader 2015 2015.006.30503 and earlier versions

Updated Versions

  • Acrobat DC 2019.021.20047
  • Acrobat Reader DC 2019.021.20047
  • Acrobat DC 2017.011.30150
  • Acrobat Reader DC 2017.011.30150
  • Acrobat DC 2015.006.30504
  • Acrobat Reader DC 2015.006.30504

Adobe Experience Manager

Security Updates released for Adobe Experience Manager (AEM). The update resolves multiple vulnerabilities with AEM versions 6.3, 6.4 and 6.5.

Successful exploitation of these vulnerabilities allows an attacker to gain unauthorized access to the AEM environment.

Adobe releases updates to AEM versions 6.3, 6.4 and 6.5 and recommends to update the users.

Adobe Experience Manager Forms

With Adobe Experience Manager Forms, Adobe fixed a cross-site scripting vulnerability with the update. The vulnerability may lead to sensitive information disclosure.

Adobe recommends users update installations to the latest versions of Adobe Experience Manager Forms 6.3, 6.4 and 6.5.

Adobe Download Manager

The security update fixes Privilege Escalation vulnerability with Adobe Download Manager for Windows. Vulnerability is categorized as an important one.

Affected Version

  • Adobe Download Manager 2.0.0.363

Updated Version

  • Adobe Download Manager 2.0.0.417

Adobe recommends users update their product installations to the latest versions using the instructions referenced in the bulletin.

Also Read

Adobe Security Update fixes Critical Vulnerabilities in Flash Player, Campaign and ColdFusion

Adobe Released Security Updates for 87 Vulnerabilities with Media Encoder, Flash, Adobe Acrobat and Reader

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows

A critical zero-day vulnerability has been discovered in Microsoft Sysinternals tools, posing a serious security threat...

7-Zip 0-Day Flaw Added to CISA’s List of Actively Exploited Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical 0-day vulnerability...

Logsign Vulnerability Allows Remote Attackers to Bypass Authentication

A critical security vulnerability has been identified and disclosed in the Logsign Unified SecOps...