• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
update adobe acrobat and reader to patch actively exploited vulnerability

Update Adobe Acrobat and Reader to Patch Actively Exploited Vulnerability

You are here: Home / General Cyber Security News / Update Adobe Acrobat and Reader to Patch Actively Exploited Vulnerability
September 13, 2023

Adobe’s Patch Tuesday update for September 2023 will come with a patch for a critical actively exploited security flaw in Acrobat and Reader that could allow an attacker to execute destructive code on vulnerable methods.

The vulnerability, tracked as CVE-2023-26369, is rated 7.8 for severity on the CVSS scoring system and impacts each Windows and macOS variations of Acrobat DC, Acrobat Reader DC, Acrobat 2020, and Acrobat Reader 2020.

Explained as an out-of-bounds generate, thriving exploitation of the bug could guide to code execution by opening a specially crafted PDF doc. Adobe did not disclose any additional details about the issue or the targeting included.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Adobe is knowledgeable that CVE-2023-26369 has been exploited in the wild in confined attacks concentrating on Adobe Acrobat and Reader,” the company acknowledged in an advisory.

Forthcoming WEBINARWay As well Susceptible: Uncovering the Condition of the Id Attack Floor

Achieved MFA? PAM? Support account defense? Find out how well-geared up your group genuinely is from identification threats

Supercharge Your Competencies

CVE-2023-26369 has an effect on the below variations –

  • Acrobat DC (23.003.20284 and earlier variations) – Fastened in 23.006.20320
  • Acrobat Reader DC (23.003.20284 and earlier versions) – Fixed in 23.006.20320
  • Acrobat 2020 (20.005.30514 for Windows and previously variations, 20.005.30516 for macOS and earlier variations) – Mounted in 20.005.30524
  • Acrobat Reader 2020 (20.005.30514 for Windows and before versions, 20.005.30516 for macOS and before versions) – Preset in 20.005.30524

Also patched by the software maker are two cross-web-site scripting flaws each individual in Adobe Hook up (CVE-2023-29305 and CVE-2023-29306) and Adobe Expertise Manager (CVE-2023-38214 and CVE-2023-38215) that could guide to arbitrary code execution.

Uncovered this short article interesting? Stick to us on Twitter  and LinkedIn to read through much more exceptional articles we put up.


Some areas of this write-up are sourced from:
thehackernews.com

Previous Post: «mozilla rushes to patch webp critical zero day exploit in firefox Mozilla Rushes to Patch WebP Critical Zero-Day Exploit in Firefox and Thunderbird
Next Post: Microsoft Releases Patch for Two New Actively Exploited Zero-Days Flaws microsoft releases patch for two new actively exploited zero days flaws»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.