Adobe Monthly Security Update (May 2024)
Release Date:
16 May 2024
4429
Views
RISK: Medium Risk
TYPE: Clients - Productivity Products
Adobe has released monthly security update for their products:
Vulnerable Product | Risk Level | Impacts | Notes | Details (including CVE) |
Adobe Acrobat and Reader | Medium Risk | Remote Code Execution Information Disclosure | APSB24-29 | |
Adobe Illustrator | Medium Risk | Remote Code Execution Information Disclosure | APSB24-30 | |
Adobe Substance 3D Painter | Medium Risk | Remote Code Execution Information Disclosure | APSB24-31 | |
Adobe Aero | Medium Risk | Remote Code Execution | APSB24-33 | |
Adobe Substance 3D Designer | Medium Risk | Information Disclosure | APSB24-35 | |
Adobe Animate | Medium Risk | Remote Code Execution Information Disclosure | APSB24-36 | |
Adobe Framemaker | Medium Risk | Remote Code Execution Information Disclosure | APSB24-37 | |
Adobe Dreamweaver | Medium Risk | Remote Code Execution | APSB24-39 |
Number of 'Extremely High Risk' product(s): 0
Number of 'High Risk' product(s): 0
Number of 'Medium Risk' product(s): 8
Number of 'Low Risk' product(s): 0
Evaluation of overall 'Risk Level': Medium Risk
Impact
- Remote Code Execution
- Information Disclosure
System / Technologies affected
- Acrobat DC 24.002.20736 and earlier versions
- Acrobat Reader DC 24.002.20736 and earlier versions
- Acrobat 2020 20.005.30574 and earlier versions
- Acrobat Reader 2020 20.005.30574 and earlier versions
- Illustrator 2024 28.4 and earlier versions
- Illustrator 2023 27.9.3 and earlier versions
- Adobe Substance 3D Painter 9.1.2 and earlier versions
- Aero 0.23.4 and earlier versions
- Adobe Substance 3D Designer 13.1.1 and earlier versions
- Adobe Animate 2023 23.0.5 and earlier versions
- Adobe Animate 2024 24.0.2 and earlier versions
- Adobe FrameMaker 2020 Release Update 5 and earlier versions
- Adobe FrameMaker 2022 Release Update 3 and earlier versions
- Adobe Dreamweaver 21.3 and earlier versions
Solutions
Before installation of the software, please visit the vendor web-site for more details.
- Apply fixes issued by the vendor. Please refer to 'Details' column in the above table for details of individual product update or run software update
Vulnerability Identifier
Source
Related Link
Related Tags
Share with