Adobe Monthly Security Update (February 2023)
Release Date:
15 Feb 2023
5453
Views
RISK: Medium Risk
TYPE: Clients - Productivity Products

Adobe has released monthly security update for their products:
Vulnerable Product | Risk Level | Impacts | Notes | Details (including CVE) |
Adobe After Effects | ![]() | Information Disclosure Remote Code Execution | APSB23-02 | |
Adobe Connect | ![]() | Security Restriction Bypass | APSB23-05 | |
Adobe Framemaker | ![]() | Information Disclosure Remote Code Execution | APSB23-06 | |
Adobe Bridge | ![]() | Information Disclosure Remote Code Execution | APSB23-09 | |
Adobe Photoshop | ![]() | Remote Code Execution Information Disclosure | APSB23-11 | |
Adobe InDesign | ![]() | Denial of Service | APSB23-12 | |
Adobe Premiere Rush | ![]() | Remote Code Execution | APSB23-14 | |
Adobe Animate | ![]() | Remote Code Execution | APSB23-15 | |
Adobe Substance 3D Stager | ![]() | Remote Code Execution | APSB23-16 |
Number of 'Extremely High Risk' product(s): 0
Number of 'High Risk' product(s): 0
Number of 'Medium Risk' product(s): 9
Number of 'Low Risk' product(s): 0
Evaluation of overall 'Risk Level': Medium Risk
Impact
- Information Disclosure
- Remote Code Execution
- Security Restriction Bypass
- Denial of Service
System / Technologies affected
- Adobe After Effects 23.1 and earlier versions
- Adobe After Effects 22.6.3 and earlier versions
- Adobe Connect 11.4.5 and earlier versions
- Adobe Connect 12.1.5 and earlier versions
- Adobe FrameMaker 2020 Release Update 4 and earlier versions
- Adobe FrameMaker 2022 Release
- Adobe Bridge 12.0.3 and earlier versions
- Adobe Bridge 13.0.1 and earlier versions
- Photoshop 2022 23.5.3 and earlier versions
- Photoshop 2023 24.1 and earlier versions
- Adobe InDesign ID18.1 and earlier versions
- Adobe InDesign ID17.4 and earlier versions
- Adobe Premiere Rush 2.6 and earlier versions
- Adobe Animate 2022 22.0.8 and earlier versions
- Adobe Animate 2023 23.0.0 and earlier versions
- Adobe Substance 3D Stager 1.3.2 and earlier versions
Solutions
Before installation of the software, please visit the vendor web-site for more details.
- Apply fixes issued by the vendor. Please refer to 'Details' column in the above table for details of individual product update or run software update
Vulnerability Identifier
Source
Related Link
Related Tags
Share with