Adobe Product Vulnerabilities
The technical details of the vulnerabilities are as follows:
Adobe Premiere Rush
- Out-of-bounds Read, which could allow for Privilege escalation. (CVE-2022-23204)
Adobe Illustrator
Adobe Photoshop
- Buffer Overflow which could allow for Arbitrary code execution. (CVE-2022-23203)
Adobe After Effects
- Out-of-bounds Write which could allow for Arbitrary code execution. (CVE-2022-23200)
Adobe Creative Cloud Desktop
- Uncontrolled Search Path Element which could allow for arbitrary code execution. (CVE-2022-23202)
What Should You Do?
CyberHoot recommends that the following actions be taken to secure your Adobe software and company systems:
- Install the updates provided by Adobe immediately.
- Go to your Adobe Creative Cloud app
- Under Apps, Click Updates
- Click Update All in top right corner
- Go to any Adobe Application
- Click the Help menu (top of your screen)
- Click Updates
- You will be prompted to update the software
- Run all software as a non-privileged user (without administrative privileges) to reduce the effects of a successful attack.
- Train users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
- Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from un-trusted sources.
- Apply the Principle of Least Privilege to all systems and services.
You have a Vulnerability Alert Management Process, right?
If you’re a subscriber to CyberHoot’s services, you’ll have access to our Policy and Process library which contains the vulnerability alert management process document. This document prescribes how to respond to situations like this and in what time frame. If your company has not yet adopted a VAMP-like process, now is a great time to get started.