Do you Use Adobe Products? Then you might be at a Risk of Cyber-Attack

The Indian Computer Emergency Response Team (CERT-In) issued a warning on Thursday about multiple vulnerabilities in Adobe products that could allow hackers to get access to computers.

InDesign (together with prior versions for Windows and macOS), InCopy, Illustrator, Bridge, and Animate were also affected (and earlier versions for Windows and macOS).

“Multiple vulnerabilities have been reported in Adobe products which could allow an attacker to gain elevated privileges, execute arbitrary code, write arbitrary files on the file system and cause a memory leak on the targeted system,” said CERT-In which comes under the Ministry of Electronics and Information Technology (MeitY).

According to the national cyber-security agency, Adobe products contain these flaws “improper Input Validation, improper authorisation, heap-based buffer overflow, out-of-bounds write, out-of-bounds read and use after free flaws”.

According to CERT-In, users should update their software as part of the Adobe security fixes.

Adobe
credit: Source

An attacker could exploit these loopholes, according to the recommendation, by enticing a victim to open a specially prepared file or application. If these vulnerabilities are successfully exploited, an attacker might gain elevated privileges, execute arbitrary code, write arbitrary files to the file system, and create a memory leak on the targeted machine.

The cyber-security agency also discovered other vulnerabilities in Citrix Application Delivery Management (ADM) solutions, which might allow a remote attacker to bypass protection and cause denial of service conditions on the targeted systems.

“This vulnerability exists in Citrix ADM due to improper access control. A remote attacker could exploit this vulnerability by sending a specially-crafted request to corrupt the system and reset the administrator password at the next device reboot,” according to CERT-In.

If this vulnerability is effectively exploited, a remote attacker could bypass security and create erroneous access control on an affected device, according to the authorities.

Also Read:

TCS, Infosys, Wipro and other Indian IT firms continue their Low Market Trend

source

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

More like this

The Best App Lockers for Android You Should Know...

Best App Lockers for Android: The Ultimate Guide In the realm of technology, app lockers play a crucial...
JPG to PDF

Online Convert of JPG to PDF: Best Options in...

Online Convert of JPG to PDF: The Ultimate Guide Converting JPG to PDF online is a seamless...
Adobe’s new AI Assistant enables you to summarize your PDFs and pose questions regarding them

Adobe’s new AI Assistant enables you to summarize your...

Adobe claims that the same AI and machine learning models that power Acrobat Liquid Mode—a feature that...
SentinelOne cybersecurity

Empowering India’s Cyber Defenses: SentinelOne Cybersecurity Launches Virtual Data...

In an exciting development for India's cybersecurity landscape, SentinelOne Cybersecurity, a global leader in autonomous cybersecurity, has...

AMD Ryzen Master vulnerability allows attackers to take control...

AMD disclosed a new vulnerability, rated 7.2 which is high, in its popular Ryzen Master software utility,...

LATEST NEWS

ASUS Brings AMD Radeon RX 9070 Series GPUs: The Future of Gaming Graphics

Picture this: You’re immersed in the latest open-world game, marveling at the lifelike reflections in a rain-soaked city street, when suddenly you realize -...

EA FC25: Newcastle vs Man United – Get An Exclusive Ultimate Virtual Showdown

In the digital realm of EA FC25, football isn’t just a game—it’s a strategic battlefield where team composition, player attributes, and tactical nuance determine...

iOS 18.4: The Must-Know Apple Intelligence Features Arriving in April

Apple's latest iOS 18.4 update may not bring the much-anticipated Siri enhancements just yet, but it still packs some powerful Apple Intelligence features that...

Monopoly Go Marble Trouble: Maximize Your Event Rewards

In the dynamic world of mobile gaming, Monopoly Go’s Marble Trouble event represents a strategic battlefield where players can transform digital resources into substantial...

Featured