Adobe Monthly Security Update (August 2021)
RISK: Medium Risk
TYPE: Clients - Productivity Products
Adobe has released monthly security update for their products:
Vulnerable Product | Risk Level | Impacts | Notes | Details (including CVE) |
Magento | Medium Risk | Security Restriction Bypass Cross-site Scripting Remote Code Execution Denial of Service Elevation of Privilege | APSB21-64 | |
Adobe Connect | Medium Risk | Security Restriction Bypass Cross-site Scripting Remote Code Execution | APSB21-66 | |
Adobe Media Encoder | Medium Risk | Remote Code Execution | APSB21-70 | |
Adobe Bridge | Medium Risk | Remote Code Execution Information Disclosure Denial of Service | APSB21-69 | |
Adobe Photoshop | Medium Risk | Remote Code Execution | APSB21-68 | |
Adobe InCopy | Medium Risk | Remote Code Execution Information Disclosure | APSB21-65 | |
Adobe Captivate | Medium Risk | Elevation of Privilege | APSB21-60 |
Number of 'Extremely High Risk' product(s): 0
Number of 'High Risk' product(s): 0
Number of 'Medium Risk' product(s): 7
Number of 'Low Risk' product(s): 0
Evaluation of overall 'Risk Level': Medium Risk
[Updated 18-August-2021] Adobe Media Encoder, Adobe Bridge, Adobe Photoshop, Adobe InCopy and Adobe Captivate are added in Adobe Security Updates released on 17-August-2021
Impact
- Elevation of Privilege
- Remote Code Execution
- Denial of Service
- Security Restriction Bypass
- Cross-Site Scripting
- Information Disclosure
System / Technologies affected
- Adobe Commerce 2.4.2 and earlier versions
- Adobe Commerce 2.4.2-p1 and earlier versions
- Adobe Commerce 2.3.7 and earlier versions
- Magento Open Source 2.4.2-p1 and earlier versions
- Magento Open Source 2.3.7 and earlier versions
- Adobe Connect 11.2.2 and earlier versions
- Adobe Media Encoder 15.4 and earlier versions
- Adobe Bridge 11.1 and earlier versions
- Photoshop 2020 21.2.10 and earlier versions
- Photoshop 2021 22.4.3 and earlier versions
- Adobe XMP-Toolkit-SDK 2020.1 and earlier versions
- Adobe Captivate 2019 11.5.5 and earlier versions
Solutions
Before installation of the software, please visit the vendor web-site for more details.
- Apply fixes issued by the vendor. Please refer to 'Details' column in the above table for details of individual product update or run software update
Vulnerability Identifier
Source
Related Link
Related Tags
Share with