Security flaws in Adobe software including Photoshop

The Indian Computer Emergency Response Team (CERT-IN), India’s state security agency, has issued a warning about security flaws in 29 Adobe Inc. software and services, including popular tools like Photoshop, cloud services, and Creative Cloud. Adobe has reported that it discovered several security flaws in its various software and services.

Adobe Photoshop, Cloud Fusion, and Creative Cloud have security flaws that India’s security agency has classified as ‘high’ risk. The agency urges Adobe to release the necessary security patches to address these issues. It claims that cybercriminals from remote locations can exploit these vulnerabilities to install ‘arbitrary code’ in Adobe’s software and services. Once they exploit these flaws, cybercriminals can access target systems and collect important personal information. The agency advises users to update their Adobe tools to avoid these security risks.

The tools with identified security flaws include Adobe Photoshop 2023 (version 24.7.3 and earlier), Adobe Photoshop 2024 (version 25.7 and earlier), Adobe Experience Manager Cloud Service, Adobe Experience Manager 6.5.20 and earlier, Adobe Audition (versions 24.2 and 23.6.4), Adobe Media Encoder 23.6.5, Adobe FrameMaker Publishing Server Version 2020 Update 3, various versions of Adobe Commerce (2.4.7, 2.4.6-P5, 2.4.5-P7, 2.4.4-P8, 2.4.3-EXT7, 2.4.2-EXT7, 2.4.1-EXT7, 2.4.0-EXT7, and 2.3.7-P4-EXT7), various versions of Magento Open Source, Adobe Commerce Webhook Plugin (1.2.0 to 1.4.0), Adobe Cloud Fusion 2023 Update 7, Adobe Cloud Fusion 2021 Update 13, Adobe Creative Cloud Desktop Application (version 6.1.0.587), and Adobe Acrobat for Android (version 24.4.2.33155).Adobe software including Photoshop

Is it possible to hack Facebook Id?

Source: Prothom Alo

Here are some common types of security flaws:

Software Bugs: Errors in the code create vulnerabilities. For example, buffer overflows happen when a program writes more data to a buffer than it can hold, potentially enabling an attacker to execute arbitrary code.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top