Adobe fixes vulnerability exploited by hackers in Acrobat and Reader
Take action: This patch is easy, but important. Update your Adobe Acrobat and Acrobat Reader, because they can be hacked by a malicious file. Which will arrive in an attachment or on a colleague's USB. The fix is easy, apply it.
Adobe's latest security updates have addressed a zero-day vulnerability that was actively exploited in real-world attacks targeting Adobe Acrobat and Reader software products.
This vulnerability, tracked as CVE-2023-26369, is categorized as an out-of-bounds write memory safety issue. It possesses the potential to be exploited by malicious actors to execute arbitrary code on systems running vulnerable installations.
Adobe has responded by releasing an update specifically designed for Adobe Acrobat and Reader on both Windows and macOS platforms. This security update is of paramount importance as it tackles a critical vulnerability that, if successfully exploited, could result in arbitrary code execution, potentially causing severe security breaches.
Adobe has also acknowledged that CVE-2023-26369 has already been exploited in the wild, albeit in limited attacks, with Adobe Acrobat and Reader as the primary targets.
It's important to note that this vulnerability affects versions on both Windows and macOS systems, emphasizing the importance of promptly applying the provided security update to safeguard against potential threats and unauthorized code execution.
|Apple Shortcuts vulnerability enables zero-click data theft
|Intel Patches vulnerability found in many generations of …
|Mozilla releases patches for Firefox, Thunderbird to fix …
|LibreOffice releases patches for WebP vulnerability
|LinkedIn accounts targeted in massive account hijacking effort