Adobe has released security updates that address an actively exploited vulnerability in Adobe Reader and other critical bugs in Adobe Acrobat, Magento, Photoshop, Animate, Illustrator, and Dreamweaver.
In total, the company addressed fifty security vulnerabilities affecting seven products, with many of them rated as critical as they local arbitrary code execution.
The Adobe Reader bug known to be actively exploited in the wild is tracked as CVE-2021-21017. This vulnerability is a buffer overflow bug that would allow a malicious website to perform remote code execution on the vulnerable computer.
Code execution bugs are the most serious as they could allow attackers to execute almost any command on a device, including installing f to install malware or take over the device.
In addition to the actively exploited Reader vulnerability, Adobe also fixed other critical vulnerabilities in their products, including:
Adobe advises customers using vulnerable products to update to the latest versions as soon as possible to block attacks that could lead to successful exploitation of unpatched installations.
Also Read: What Legislation Exists in Singapore Regarding Data Protection and Security?
In most cases, users can update their software by using the auto-update feature of the product using the following steps:
Other products, like Magento, may require a user to install the security patch manually.
Also Read: A Look at the Risk Assessment Form Singapore Government Requires