The advisory identifies that currently, there have been no reported cases of these vulnerabilities being actively exploited in the wild. The specific affected products include various versions of Adobe Commerce (both B2B and Open Source), Adobe Experience Manager (AEM) Forms, Adobe ColdFusion, Adobe After Effects, Adobe Media Encoder, Adobe Bridge, Adobe Premiere Pro, Adobe Photoshop, Adobe Animate, AEM Screens, Adobe FrameMaker, and Adobe XMP Toolkit SDK.
The vulnerabilities comprise a range of issues categorized under different tactics and techniques, such as execution and client exploitation. Notable vulnerabilities include improper authorization, cross-site request forgery, insufficiently protected credentials, deserialization of untrusted data, and various buffer overflows across different Adobe products. Each vulnerability is linked to specific identified CVE (Common Vulnerabilities and Exposures) numbers for tracking and remediation purposes.
The risk levels vary depending on the entity. For large and medium government organizations, the risk is considered high, while it is medium for small government entities. In the commercial sector, the risk is high for larger businesses and medium for smaller ones.
To mitigate these vulnerabilities, the advisory recommends immediate action, urging users to apply stable channel updates provided by Adobe after conducting appropriate testing. In addition, it advises the establishment and maintenance of a comprehensive vulnerability management process for enterprise assets, including regular updates to documentation and a risk-based remediation strategy. Adopted safeguards include the practice of automated vulnerability scans for externally exposed assets, periodic penetration testing, and remedial actions for any identified vulnerabilities.
Moreover, it emphasizes the importance of limiting administrative privileges, implementing user account controls to maintain the principle of least privilege, and securing default accounts by either disabling or rendering them unusable. Enhanced web safety measures include restricting access to potentially malicious websites, blocking unwanted file types in communications to prevent the introduction of risks, and ensuring only authorized scripts and applications can execute on systems.
Other recommendations involve enabling anti-exploitation features, deploying host-based intrusion detection systems, and establishing a strategy to monitor and control the behavior of execution patterns on endpoints to curb suspicious activity proactively. The advisory implements a broad set of safeguards meant to bolster security frameworks and practices, emphasizing the need for an ongoing assessment and adaption of security measures to address evolving threats effectively.
In summary, this advisory serves as a crucial alert for organizations using Adobe products, highlighting the critical need to address emerging vulnerabilities through updates, improved practices, and strategic security measures. It underlines the ongoing challenge for businesses to safeguard their systems proactively against potential exploitation of software vulnerabilities.
Enlace de la fuente, haz clic para tener más información