Saturday, December 28, 2024
HomeCyber AttackCritical Security Updates Released for Adobe Illustrator, Bridge, and Magento

Critical Security Updates Released for Adobe Illustrator, Bridge, and Magento

Published on

SIEM as a Service

Adobe released emergency security updates that resolve critical vulnerabilities with three of it’s most used products such as Adobe Illustrator, Bridge, and Magento commerce.

Adobe Illustrator – APSB20-20

Security updates fixed 5 critical vulnerabilities with Adobe Illustrator 2020 for Windows that allows attackers to execute arbitrary code with the context of the current user.

Illustrator versions 24.0.2  and  earlier  versions are affected and the issues fixed with version 24.1.2.

- Advertisement - SIEM as a Service

Adobe Bridge – APSB20-19

Adobe released security updates for Adobe Bridge that fixes multiple 14 critical and 3 important vulnerabilities. The flaws lead to arbitrary code execution and information disclosure.

Adobe Bridge 10.0.1 and earlier version are affected, fixed with Adobe Bridge 10.0.4.

Magento – APSB20-22

The updates also cover Magento Commerce and Open Source editions, 6 critical, 4 important, and 3 moderate vulnerabilities fixed. Successful exploitation of the vulnerabilities leads to arbitrary code execution.

Affected Versions

ProductVersionPlatform
Magento Commerce 2.3.4 and earlier versions    All
Magento Open Source   2.3.4 and earlier versions    All
Magento Commerce 2.2.11 and earlier versions (see note)All
Magento Open Source  2.2.11 and earlier versions (see note)All
Magento Enterprise Edition    1.14.4.4 and earlier versions    All
Magento Community Edition   1.9.4.4 and earlier versions    All

Fixed Versions

ProductVersionPlatformPriority RatingAvailability
Magento Commerce    2.3.4-p2All22.3.4-p2 Commerce
Magento Open Source    2.3.4-p2All22.3.4-p2 Open Source
Magento Commerce    2.3.5-p1All22.3.5 Commerce
Magento Open Source    2.3.5-p1All22.3.5 Open Source
Magento Enterprise Edition    1.14.4.5All21.14.4.5
Magento Community Edition    1.9.4.5All21.9.4.5

Adobe recommends users update their product installations to the latest versions using the instructions referenced in the bulletin.

Related Read

Adobe Released Security Updates for 87 Vulnerabilities with Media Encoder, Flash, Adobe Acrobat and Reader

Adobe Released Security Updates & Fixed 43 Vulnerabilities in Acrobat Reader, Adobe Flash & More

Adobe Releases Security Updates that Fixes Critical Vulnerabilities with Photoshop CC and Digital Editions

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...