Monday, March 3, 2025
HomeComputer SecurityAdobe Release Security Patches to Fix Critical Vulnerabilities for Adobe Photoshop

Adobe Release Security Patches to Fix Critical Vulnerabilities for Adobe Photoshop

Published on

SIEM as a Service

Follow Us on Google News

Adobe released security patches that fix multiple critical vulnerabilities with Adobe Photoshop CC 19.1.5 and earlier 19.x versions, as well as 18.1.5 and earlier 18.x versions for Windows and macOS.

The vulnerability can be tracked as CVE-2018-12810 and CVE-2018-12811, the two critical memory corruption vulnerability allows a remote attacker to execute arbitrary code in the context of the current user on the targeted system. The vulnerability is due to the improper memory operations with Adobe Photoshop versions.

If the targeted user has elevated privileges it allows an attacker to compromise the complete system. To resolve the issue adobe released updated version Photoshop CC 2017 and Photoshop CC 2018. Those vulnerabilities are never exploited in the wild.

ProductUpdated versionsPlatform
Photoshop CC 201819.1.6Windows and macOS
Photoshop CC 201718.1.6Windows and macOS

With the August security updates cover’s 11 security vulnerabilities including two critical vulnerabilities with the most popular Adobe Acrobat and Reader.

Users are recommended to update their software installations to the latest versions, to update manually Help for Adobe security updates > Check for Updates.

The vulnerability was reported to Adobe by Kushal Arvind Shah of Fortinet’s FortiGuard Labs.

Also Read

Adobe Released August Patch Covering 11 Vulnerabilities That Affects Multiple Popular Adobe Products

US Government to Remove Adobe Flash Contents From Federal Agency Sites and Computers

Adobe Released Security Updates & Fixes for 112 Vulnerabilities that Affected Adobe Products

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage...

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations...

New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data

A new variant of malware, dubbed "Poco RAT," has emerged as a potent espionage...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ghidra 11.3 Released – A Major Update to NSA’s Open-Source Tool

The National Security Agency (NSA) has officially released Ghidra 11.3, the latest iteration of...

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access

On February 3, 2025, Google published its February Android Security Bulletin, which addresses a...

Beware of SmartApeSG Campaigns that Deliver NetSupport RAT

SmartApeSG, a FakeUpdate cyber threat, has emerged as a significant vector for delivering NetSupport...