Adobe Patch Tuesday fixed critical vulnerabilities in Magento, Acrobat and Reader

Pierluigi Paganini February 14, 2024

Adobe Patch Tuesday security updates for February 2024 addressed more than 30 vulnerabilities in multiple products, including critical issues.

Adobe Patch Tuesday security updates released by Adobe addressed over 30 vulnerabilities across various products, including critical issues.

The software maker warned of critical flaws in popular products such as Adobe Acrobat and Reader, Adobe Commerce and Magento Open Source, Substance 3D Painter, and FrameMaker.

The company fixed 13 vulnerabilities in the Adobe Acrobat and Reader software, including arbitrary code execution, application denial of service and memory leak vulnerabilities.

“Adobe has released a security update for Adobe Acrobat and Reader for Windows and macOS. This update addresses critical and important vulnerabilities.” reads the advisory. “Successful exploitation could lead to arbitrary code execution, application denial-of-service, and memory leak.”

Below is the list of vulnerabilities addressed by the software vendor:

Vulnerability CategoryVulnerability ImpactSeverityCVSS base scoreCVSS vectorCVE Number
Out-of-bounds Write (CWE-787)Arbitrary code executionCritical7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVE-2024-20726
Out-of-bounds Write (CWE-787)Arbitrary code executionCritical7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVE-2024-20727
Out-of-bounds Write (CWE-787)Arbitrary code executionCritical7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVE-2024-20728
Use After Free (CWE-416)Arbitrary code executionImportant7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVE-2024-20729
Integer Overflow or Wraparound (CWE-190)Arbitrary code executionCritical7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVE-2024-20730
Use After Free (CWE-416)Arbitrary code executionCritical8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVE-2024-20731
Improper Input Validation (CWE-20)Application denial-of-serviceImportant5.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HCVE-2024-20733
Use After Free (CWE-416)Memory leakImportant5.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NCVE-2024-20734
Out-of-bounds Read (CWE-125)Memory leakImportant5.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NCVE-2024-20735
Out-of-bounds Read (CWE-125)Memory leakImportant5.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NCVE-2024-20736
Out-of-bounds Read (CWE-125)Memory leakImportant5.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NCVE-2024-20747
Out-of-bounds Read (CWE-125)Memory leakImportant5.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NCVE-2024-20748
Out-of-bounds Read (CWE-125)Memory leakImportant5.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NCVE-2024-20749

Below is the list of vulnerabilities addressed by the software firm that impact Adobe Commerce and Magento Open Source products:

Vulnerability CategoryVulnerability ImpactSeverityAuthentication required to exploit?Exploit requires admin privileges?CVSS base scoreCVSS vectorCVE number(s)
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionCriticalYesYes9.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HCVE-2024-20719
Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78)Arbitrary code executionCriticalYesYes9.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HCVE-2024-20720
Uncontrolled Resource Consumption (CWE-400)Application denial-of-serviceImportantYesYes5.7CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:N/A:HCVE-2024-20716
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportantYesYes5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-20717
Cross-Site Request Forgery (CSRF) (CWE-352)Security feature bypassModerateYesNo4.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NCVE-2024-20718

According to the advisory, the above vulnerabilities can be exploited only by an authenticated attacker.

“Exploit requires admin privileges: The vulnerability is (or is not) only exploitable by an attacker with administrative privileges.” states the advisory.

The good news is that the software vendor is not aware of attacks in the wild exploiting these vulnerabilities.

Microsoft Patch Tuesday security updates for February 2024 resolved a total of 72 vulnerabilities, including two actively exploited zero-days.

The vulnerabilities affect Microsoft Windows and Windows Components; Office and Office Components; Azure; .NET Framework and ASP.NET; SQL Server; Windows Hyper-V; and Microsoft Dynamics.

Five vulnerabilities are rated Critical, 65 are rated Important, and two are rated Moderate in severity.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – ransomware, Patch Tuesday) 



you might also like

leave a comment