Adobe Patches 55 Vulnerabilities Across 11 Products
Critical ColdFusion vulnerabilities are the most at risk of being exploited in attacks, according to the software giant.

Aggregated from SecurityWeek
This article was automatically aggregated from an external source. Content may be summarized.
Full Analysis
Adobe’s latest Patch Tuesday updates fix 55 vulnerabilities across 11 of the company’s products.
Nearly all of the 11 new advisories have a priority rating of 3, which indicates that the software giant does not expect them to be exploited in attacks.
However, an advisory describing five critical ColdFusion vulnerabilities has a priority rating of 1, indicating that companies should prioritize patching because the product has historically been targeted by threat actors.
Several ColdFusion vulnerabilities have been exploited in attacks in recent years.
The ColdFusion flaws patched with the latest updates can be exploited to bypass security features, read files from the system, and execute arbitrary code.
Critical code execution vulnerabilities have also been patched in Acrobat Reader, InDesign, InCopy, FrameMaker, Connect, Bridge, Photoshop, and Illustrator.
Advertisement. Scroll to continue reading.
Important-severity issues — including ones allowing code execution, DoS attacks, and privilege escalation — were patched in Experience Manager Screens and the DNG SDK.
The company is not aware of in-the-wild exploitation for any of the vulnerabilities.
However, a few days ago Adobe announced patches for CVE-2026-34621, an Acrobat and Reader zero-day that appears to have been exploited for several months.
In addition, CISA warned on Monday that it’s aware of attacks exploiting an old Acrobat and Reader vulnerability tracked as CVE-2020-9715.
Related: SAP Patches Critical ABAP Vulnerability
Related: Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000
Originally published by SecurityWeek
Original Source
SecurityWeek