Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
SYSTEMS AFFECTED:
RISK:
Government:
Businesses:
Home users: Low
TECHNICAL SUMMARY:
Multiple vulnerabilities have been discovered in Adobe Products, the most severe of which could allow for arbitrary code execution. Details of these vulnerabilities are as follows:
Adobe Character Animator
Adobe ColdFusion
Adobe InDesign
Adobe Framemaker
Adobe InCopy
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
RECOMMENDATIONS:
We recommend the following actions be taken:
REFERENCES:
Adobe:
https://helpx.adobe.com/security/security-bulletin.html
https://helpx.adobe.com/security/products/character_animator/apsb22-21.html
https://helpx.adobe.com/security/products/coldfusion/apsb22-22.html
https://helpx.adobe.com/security/products/indesign/apsb22-23.html
https://helpx.adobe.com/security/products/framemaker/apsb22-27.html
https://helpx.adobe.com/security/products/incopy/apsb22-28.html
CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28836