Adobe Patches Critical Flaws in Multiple Products, Urging Users to Update
Adobe has released crucial security updates to address multiple critical vulnerabilities across several of its widely-used software products. The patches address flaws that could potentially lead to code execution attacks, unauthorized access, and information disclosure. Users are strongly urged to update their Adobe software immediately.
Critical Vulnerabilities and Affected Products
The most severe vulnerability, CVE-2024-30299, impacts Adobe FrameMaker Publishing Server and is rated with a critical CVSSv3.1 base score of 10.0. This flaw could allow an unauthenticated attacker to execute arbitrary code on the server, potentially leading to a full system compromise.
Adobe Commerce, another critical product, also received significant attention. The patch addresses the CVE-2024-34102 XML External Entity (XXE) vulnerability, which has a CVSS base score of 9.8. Moreover, the update tackles ten other vulnerabilities, including the input validation flaw CVE-2024-34108, which carries a CVSS base score of 9.1. The open-source Magento platform, associated with Adobe Commerce, is also impacted by these updates.
Other products receiving updates for critical vulnerabilities include Adobe Experience Manager, Adobe Creative Cloud Desktop, Adobe Photoshop, and Adobe Substance 3D Stager. These vulnerabilities range in severity, with potential impacts including unauthorized access, information disclosure, and arbitrary code execution.
Urgency of Updates and Mitigations
While Adobe is not currently aware of any active exploitation of these vulnerabilities, the potential for serious consequences is significant. Users are strongly advised to update their software to the latest versions immediately to mitigate the risk of exploitation.