• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
adobe forced to patch its own failed security update

Adobe forced to patch its own failed security update

You are here: Home / General Cyber Security News / Adobe forced to patch its own failed security update
February 18, 2022

Adobe has experienced to issue a different application update after an out-of-band patch failed to repair a vulnerability in its e-commerce program.

Last weekend, the organization unveiled an out-of-band patch to correct a vulnerability in its Adobe Commerce and Magento Open up Source e-commerce products.

The CVE-2022-24086 enter validation bug authorized attackers to run their individual code on e-commerce web pages, creating them vulnerable to cart skimmers. The corporation explained that the attack experienced been exploited in the wild.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Adobe credited the new discovery to 1 of the bug scientists that identified the primary vulnerability. The researcher from security business Bugscale, who utilizes the Twitter tackle @Blaklis, warned about Adobe’s initially patch on Twitter. “THIS IS NOT Ample to be safe and sound,” they explained, including a comment that hinted at the bring about of the challenge: “take care of json/url encoded values”.

Scientists at security company Good Systems also warned that they experienced bypassed the preliminary patch to exploit the vulnerability again. “We weren’t the initial,” they included.

A new patch have been released for Magento 2, to mitigate the pre-authenticated remote code execution. If you patched with the very first patch, THIS IS NOT Adequate to be harmless.Make sure you update all over again!https://t.co/[email protected] (as you experienced a PoC much too!)#magento

— Blaklis (@Blaklis_) February 17, 2022

The further study made a new vulnerability ID, CVE-2022-24087. It mirrors the to start with bug’s 9.8 (critical) ranking. Adobe introduced a fix for the bug, which consumers ought to apply on leading of the initial patch.

This is just not the 1st critical vulnerability that Adobe has experienced to patch recently. Earlier this month it issued a patch for a critical bug, CVE-2022-23202, that enabled attackers to execute their possess code in its Creative Cloud Desktop application.

It also patched an arbitrary code execution bug in Adobe Following Results, and an additional in Photoshop.


Some parts of this write-up are sourced from:
www.itpro.co.uk

Previous Post: «new critical rce bug found in adobe commerce, magento New Critical RCE Bug Found in Adobe Commerce, Magento
Next Post: US Goes After Crypto Criminals Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Link Found Connecting Chaos, Onyx and Yashma Ransomware
  • Zoom Patches ‘Zero-Click’ RCE Bug
  • Messages Sent Through Zoom Can Expose People to Cyber-Attack
  • Verizon Report: Ransomware, Human Error Among Top Security Risks
  • How Secrets Lurking in Source Code Lead to Major Breaches
  • Learn How Hackers Can Hijack Your Online Accounts Even Before You Create Them
  • UK Government Cybersecurity Advisory Board Applications Now Open
  • Better together: Accelerating security and success for MSPs with automation
  • GoodWill Ransomware Demands People Help the Most Vulnerable
  • McAfee appoints Greg Johnson as new CEO

Copyright © TheCyberSecurity.News, All Rights Reserved.