Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.
- Adobe Connect is a software suite for online collaboration.
- Adobe Commerce is an enterprise-grade eCommerce platform that provides tools for creating and managing online stores for both B2B and B2C businesses.
- Magento Open Source is a free, downloadable eCommerce platform from Adobe that provides the core tools to create and manage an online store.
- Adobe Creative Cloud is a subscription service that provides access to Adobe’s suite of creative software applications.
- Adobe Bridge is a digital asset management and file browser for Creative Cloud applications.
- Adobe Animate is a multimedia creation tool used for designing interactive animations.
- Adobe Experience Manager (AEM) is a comprehensive content management and digital asset management system.
- Adobe Substance 3D Viewer is a free, standalone desktop application (currently in beta) designed to help designers and artists visualize and work with 3D models, textures, and materials.
- Adobe Substance 3D Modeler is a sculpting and 3D modeling application within Adobe’s Substance 3D suite that combines virtual reality (VR) and desktop experiences for natural, gestural creation of 3D models.
- Adobe FrameMaker is an authoring and publishing application primarily used for creating and managing long, complex technical and structured documents.
- Adobe Illustrator is used for creating vector-based graphics like logos, icons, and illustrations that can be scaled to any size without losing quality.
- Adobe Dimension is a 3D design application for creating photorealistic product mockups, brand visualizations, and other 3D graphics.
- Adobe Substance 3D Stager is a professional software for creating and rendering 3D scenes to produce photorealistic images.
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights
–
Read More – Cyber Security Advisories – MS-ISAC
