Skip to main content

Adobe Monthly Security Update (March 2025)

Release Date: 12 Mar 2025 481 Views

RISK: Medium Risk

TYPE: Clients - Productivity Products

TYPE: Productivity Products

Adobe has released monthly security update for their products:

 

Vulnerable ProductRisk LevelImpactsNotesDetails (including CVE)
Adobe Acrobat and ReaderMedium Risk Medium RiskRemote Code Execution
Information Disclosure
 APSB25-14
Adobe IllustratorMedium Risk Medium RiskRemote Code Execution
Information Disclosure
Denial of Service
 APSB25-17
Adobe InDesignMedium Risk Medium RiskInformation Disclosure
Remote Code Execution
Denial of Service
 APSB25-19
Substance 3D SamplerMedium Risk Medium RiskRemote Code Execution APSB25-16
Substance 3D PainterMedium Risk Medium RiskRemote Code Execution APSB25-18
Substance 3D ModelerMedium Risk Medium RiskRemote Code Execution
Denial of Service
Information Disclosure
 APSB25-21
Substance 3D DesignerMedium Risk Medium RiskRemote Code Execution APSB25-22

 

Number of 'Extremely High Risk' product(s): 0

Number of 'High Risk' product(s): 0

Number of 'Medium Risk' product(s): 7

Number of 'Low Risk' product(s): 0

Evaluation of overall 'Risk Level': Medium Risk


Impact

  • Remote Code Execution
  • Information Disclosure
  • Denial of Service

System / Technologies affected

  • Acrobat DC 25.001.20428 and earlier versions
  • Acrobat Reader DC 25.001.20428 and earlier versions
  • Acrobat 2024 24.001.30225 and earlier versions
  • Acrobat 2020 20.005.30748 and earlier versions
  • Acrobat Reader 2020 20.005.30748 and earlier versions
  • Illustrator 2025 29.2.1 and earlier versions
  • Illustrator 2024 28.7.4 and earlier versions
  • Adobe InDesign ID20.1 and earlier versions
  • Adobe InDesign ID19.5.2 and earlier versions
  • Adobe Substance 3D Sampler 4.5.2 and earlier versions
  • Adobe Substance 3D Painter 10.1.2 and earlier versions
  • Adobe Substance 3D Modeler 1.15 and earlier versions
  • Adobe Substance 3D Designer 14.1 and earlier versions

Solutions

Before installation of the software, please visit the vendor web-site for more details.

  • Apply fixes issued by the vendor. Please refer to 'Details' column in the above table for details of individual product update or run software update.

Vulnerability Identifier


Source


Related Link