Saturday, February 8, 2025
HomeCVE/vulnerabilityCritical Code Execution Flaws With Adobe Acrobat and Reader - Update Now!!

Critical Code Execution Flaws With Adobe Acrobat and Reader – Update Now!!

Published on

SIEM as a Service

Follow Us on Google News

Adobe has released updates that fix twenty-six vulnerabilities in the Adobe Acrobat, Reader, and Lightroom products.

Out of 26 flaws, 11 are rated as critical, they could be exploited by hackers to run the arbitrary code remotely or to bypass security features on the vulnerable installations.

Adobe Acrobat and Reader | APSB20-48

Adobe released security updates for Adobe Acrobat and Reader for Windows and macOS, the updates cover critical and important vulnerabilities. Successful exploitation allows attackers to execute remote code in the context of the current user.

List of Vulnerabilities

Vulnerability CategoryVulnerability ImpactSeverityCVE Number
Disclosure of Sensitive DataMemory LeakImportant   CVE-2020-9697
Security bypass Privilege Escalation ImportantCVE-2020-9714
Out-of-bounds writeArbitrary Code Execution         Critical CVE-2020-9693CVE-2020-9694
Security bypassSecurity feature bypassCritical CVE-2020-9696CVE-2020-9712
Stack exhaustionApplication denial-of-serviceImportant CVE-2020-9702CVE-2020-9703
Out-of-bounds readInformation disclosureImportant CVE-2020-9723CVE-2020-9705CVE-2020-9706CVE-2020-9707CVE-2020-9710CVE-2020-9716CVE-2020-9717CVE-2020-9718CVE-2020-9719CVE-2020-9720CVE-2020-9721
Buffer errorArbitrary Code Execution         Critical CVE-2020-9698CVE-2020-9699CVE-2020-9700CVE-2020-9701CVE-2020-9704
Use-after-free   Arbitrary Code Execution         Critical CVE-2020-9715CVE-2020-9722

Fixed versions

ProductTrackUpdated VersionsPlatformPriority RatingAvailability
Acrobat DCContinuous2020.012.20041Windows and macOS2Windows    macOS  
Acrobat Reader DCContinuous2020.012.20041Windows and macOS2Windows
macOS
      
Acrobat 2020Classic 2020           2020.001.30005Windows and macOS     2Windows    macOS  
Acrobat Reader 2020Classic 2020           2020.001.30005Windows and macOS     2Windows
macOS
      
Acrobat 2017Classic 20172017.011.30175Windows and macOS2WindowsmacOS
Acrobat Reader 2017Classic 20172017.011.30175Windows and macOS2WindowsmacOS
      
Acrobat 2015Classic 20152015.006.30527Windows and macOS2WindowsmacOS
Acrobat Reader 2015Classic 20152015.006.30527Windows and macOS2WindowsmacOS

Adobe Lightroom | APSB20-51

Adobe Lightroom Classic for Windows and macOS covers important security updates, successful exploitation of the vulnerability allows attackers to escalate privilege.

List of Vulnerabilities

Vulnerability CategoryVulnerability ImpactSeverityCVE Numbers
Insecure Library LoadingPrivilege escalation
Important
CVE-2020-9724

Adobe recommends users update their product installations to the latest versions using the instructions referenced in the bulletin.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Related Read

Adobe Released Security Updates for 87 Vulnerabilities with Media Encoder, Flash, Adobe Acrobat and Reader

Adobe Released Security Updates & Fixed 43 Vulnerabilities in Acrobat Reader, Adobe Flash & More

Adobe Releases Security Updates that Fixes Critical Vulnerabilities with Photoshop CC and Digital Editions

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Hackers Leveraging Image & Video Attachments to Deliver Malware

Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows

A critical zero-day vulnerability has been discovered in Microsoft Sysinternals tools, posing a serious security threat...

7-Zip 0-Day Flaw Added to CISA’s List of Actively Exploited Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical 0-day vulnerability...

Logsign Vulnerability Allows Remote Attackers to Bypass Authentication

A critical security vulnerability has been identified and disclosed in the Logsign Unified SecOps...