[ad_1]
Computer Emergency Response Team (CERT-In) has issued a high-severity warning about multiple vulnerabilities in multiple Adobe applications. According to the report, multiple vulnerabilities have been reported in Adobe products which can allow an attacker to bypass security restrictions on the targeted system.
List of affected Adobe applications
List of affected Adobe applications
- ColdFusion 2023 Update 5 and earlier versions
- ColdFusion 2021 Update 11 and earlier versions
- RoboHelp Server RHS 11.4 and earlier versions
- Acrobat DC 23.006.20360 and earlier versions
- Acrobat Reader DC 23.006.20360 and earlier versions
- Acrobat 2020 20.005.30524 and earlier versions
- Acrobat Reader 2020 20.005.30524 and earlier versions
- Adobe InDesign ID18.5 and earlier versions
- Adobe InDesign ID17.4.2 and earlier versions
- Photoshop 2023 24.7.1 and earlier versions
- Photoshop 2024 25.0 and earlier versions
- Adobe Bridge 13.0.4 and earlier versions
- Adobe Bridge 14.0.0 and earlier versions
- Adobe FrameMaker Publishing Server Version – 2022 and earlier versions
- Adobe InCopy 18.5 and earlier versions
- Adobe InCopy 17.4.2 and earlier versions
- Adobe Animate 2023 23.0.2 and earlier versions
- Adobe Dimension 3.4.9 and earlier versions
- Adobe Media Encoder 24.0.2 and earlier versions
- Adobe Media Encoder 23.6 and earlier versions
- Adobe Audition 24.0 and earlier versions
- Adobe Audition 23.6.1 and earlier versions
- Adobe Premiere Pro 24.0 and earlier versions
- Adobe Premiere Pro 23.6 and earlier versions
- Adobe After Effects 24.0.2 and earlier versions
- Adobe After Effects 23.6 and earlier versions
What’s the warning
CERT-In has mentioned multiple vulnerabilities in Adobe products that can let an attacker bypass security restrictions, execute arbitrary code remotely, disclose sensitive information and perform denial of service (DoS) conditions on the system.
What users can do?
CERT-In has advised users of these Adobe applications to apply an appropriate patch as soon as possible. This means, users are required to download and install the latest version of the affected application and install.
[ad_2]
Source link