Adobe Monthly Security Update (March 2024)
[Updated on 2024-12-17]
Updated Risk, Description, Impact, Source and Related Links.
CVE-2024-20767 is being exploited in the wild. An attacker who successfully exploited this vulnerability could access or modify restricted files via an internet-exposed admin panel.
Adobe has released monthly security update for their products:
Vulnerable Product | Risk Level | Impacts | Notes | Details (including CVE) |
Adobe Experience Manager | Cross-site Scripting Remote Code Execution Security Restriction Bypass | APSB24-05 | ||
Adobe Premiere Pro | Remote Code Execution | APSB24-12 | ||
Adobe ColdFusion | Information Disclosure Data Manipulation | CVE-2024-20767 is being exploited in the wild. An attacker who successfully exploited this vulnerability could access or modify restricted files via an internet-exposed admin panel. | APSB24-14 | |
Adobe Bridge | Remote Code Execution Information Disclosure | APSB24-15 | ||
Adobe Lightroom | Remote Code Execution | APSB24-17 | ||
Adobe Animate | Remote Code Execution Information Disclosure | APSB24-19 |
Number of ‘Extremely High Risk’ product(s): 0
Number of ‘High Risk’ product(s): 1
Number of ‘Medium Risk’ product(s): 5
Number of ‘Low Risk’ product(s): 0
Evaluation of overall ‘Risk Level’: High Risk
RISK: High Risk
TYPE: Clients – Productivity Products
Impact
- Remote Code Execution
- Security Restriction Bypass
- Cross-Site Scripting
- Information Disclosure
- Data Manipulation
System / Technologies affected
- Adobe Experience Manager (AEM) AEM Cloud Service (CS)
- Adobe Experience Manager (AEM) 6.5.19.0 and earlier versions
- Adobe Premiere Pro 24.1 and earlier versions
- Adobe Premiere Pro 23.6.2 and earlier versions
- ColdFusion 2023 Update 6 and earlier versions
- ColdFusion 2021 Update 12 and earlier versions
- Adobe Bridge  13.0.5 and earlier versions
- Adobe Bridge  14.0.1 and earlier versions
- Lightroom 7.1.2 and earlier versions
- Adobe Animate 2023 23.0.3 and earlier versions
- Adobe Animate 2024 24.0 and earlier versions
Solutions
Before installation of the software, please visit the vendor web-site for more details.
- Apply fixes issued by the vendor. Please refer to ‘Details’ column in the above table for details of individual product update or run software update
Vulnerability Identifier
Source
Related Link
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.