Adobe patches over 30 vulnerabilities in Adobe Software suites
Take action: No need for panic mode patching. Prioritize Adobe Commerce, as it carries the most critical issue and is most complex. The rest of the patched vulnerabilities are almost, but not quite critical. Still, since it's Acrobat and everyone and their mother has it, hackers will find ways to exploit it. Patching Acrobat and Dimension is not really difficult. So click on the update and patch your instances.
Learn More
Adobe, aunveiled a comprehensive set of more than 30 patches to address vulnerabilities within its software lineup of Acrobat, and Acrobat Reader, Adobe Commerce and Magento Open Source as well as Adobe Dimension.
Per adobe sixteen of the vulnerabilities have been classified as critical, although only one of the vulnerabilities carries a CVSS3 score over 9 - "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" in Adobe Commerce/Magento.
The rest of the vulnerabilities are CVSS Score 8.6 or lower. That doesn't mean that vulnerabilities should be ignored, just that you have time to properly plan a patch.
Intrusion into specific vulnerabilities could grant attackers extensive privileges, enabling them to not only access sensitive data but also manipulate it, install unauthorized programs, and even establish new user accounts. Tthere is currently no evidence to suggest that they have been exploited by malicious actors, as confirmed by Adobe.