• Home
  • |
  • Blog
  • |
  • Identify And Fix Your Adobe Products Affected With Multiple Vulnerabilities
Identify and Fix Your Adobe Products Affected With Multiple Vulnerabilities

Previous week, Abode reported a long list of vulnerabilities from low to Critical on their multiple products. The report says that flaws have affected both the Windows and mac platform. We urge you to find and fix the vulnerable adobe products in your system and apply the patch as soon as possible. Go through this post to identify and fix your Adobe products affected with multiple vulnerabilities.

Impact of These Vulnerabilities:

Research says that these vulnerabilities could allow an attacker to carry out multiple cyber attacks on the vulnerable Adobe products which lead to data exfiltration, information discloser, and compromise the system. If you don’t find the Adobe products affected with these vulnerabilities and fix then up. You may become a victim of privilege escalation, remote code execution, arbitrary code execution, cross-site-scripting,  and denial of service attacks.

List of Adobe Products Affected with Multiple Vulnerabilities:

Here is the list of vulnerable Adobe Products and its versions. Check our your Adobe Product out of this list and fix the flaws as soon as you can.

Adobe ProductAffected VersionsVulnerabilities
Adobe Premiere Rush1.5.16 and priorCVE-2021-40783CVE-2021-40784CVE-2021-43021CVE-2021-43022CVE-2021-43023CVE-2021-43024CVE-2021-43025CVE-2021-43026CVE-2021-43028CVE-2021-43029CVE-2021-43030CVE-2021-43746CVE-2021-43747CVE-2021-43748CVE-2021-43749CVE-2021-43750
Adobe Experience ManagerAEM Cloud Service (CS)6.5.10.0 and priorCVE-2021-43761CVE-2021-40722CVE-2021-43762CVE-2021-43764CVE-2021-43765CVE-2021-44176CVE-2021-44177CVE-2021-44178
Adobe Connect11.3 and priorCVE-2021-43014
Photoshop 202122.5.3 and priorCVE-2021-43018CVE-2021-43020CVE-2021-44184
Photoshop 202223.0.2 and priorCVE-2021-43018CVE-2021-43020CVE-2021-44184
Adobe Prelude22.0 and priorCVE-2021-43754CVE-2021-44696
Adobe After Effects18.4.2 and priorCVE-2021-43755CVE-2021-44188CVE-2021-44189CVE-2021-44190CVE-2021-44191CVE-2021-44192CVE-2021-44193CVE-2021-44194CVE-2021-44195CVE-2021-43027
Adobe Dimension3.4.3 and priorCVE-2021-43763CVE-2021-44179CVE-2021-44180CVE-2021-44181CVE-2021-44182CVE-2021-44183
Adobe Premiere Pro15.4.2 and priorCVE-2021-43751CVE-2021-40790CVE-2021-40791CVE-2021-40795CVE-2021-42265
Adobe Media Encoder15.4.2 and priorCVE-2021-43756CVE-2021-43757CVE-2021-43758CVE-2021-43759CVE-2021-43760
Lightroom4.4 and priorCVE-2021-43753
Adobe Audition version14.4 and priorCVE-2021-44697CVE-2021-44698CVE-2021-44699

Summary of Vulnerabilities Affects Adobe Products:

VulnerabilitiesVulnerability ImpactCVSS ScoreSeverityCVSS Vector
CVE-2021-40783Arbitrary Code Execution      Critical  
CVE-2021-40784Arbitrary Code Execution      Critical  
CVE-2021-43021Arbitrary code executionCritical
CVE-2021-43022Arbitrary code executionCritical
CVE-2021-43023Arbitrary code executionCritical
CVE-2021-43024Application denial-of-serviceImportant
CVE-2021-43025Arbitrary code executionCritical
CVE-2021-43026Arbitrary code executionCritical
CVE-2021-43028Arbitrary code executionCritical
CVE-2021-43029Arbitrary code executionCritical
CVE-2021-43030Privilege escalationImportant
CVE-2021-43746Arbitrary code executionCritical
CVE-2021-43747Arbitrary code executionCritical
CVE-2021-43748Application denial-of-serviceImportant
CVE-2021-43749Application denial-of-serviceImportant
CVE-2021-43750Application denial-of-serviceImportant
CVE-2021-43761Arbitrary code execution8CriticalCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVE-2021-40722Arbitrary code execution9.8CriticalCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2021-43762Security feature bypass6.5ImportantCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2021-43764Arbitrary code execution8CriticalCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVE-2021-43765Arbitrary code execution8.1CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CVE-2021-44176Arbitrary code execution8.1CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CVE-2021-44177Arbitrary code execution8.1CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CVE-2021-44178Arbitrary code execution5.4ImportantCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CVE-2021-43755Arbitrary   code execution 7.8CriticalCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-44188Arbitrary   code execution7.8CriticalCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-44189Privilege   escalation3.3ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-44190Privilege   escalation3.3ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-44191Privilege   escalation3.3ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-44192Privilege   escalation3.3ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-44193Privilege   escalation3.3ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-44194Privilege   escalation3.3ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-44195Privilege   escalation3.3ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-43027Privilege   escalation3.3ModerateCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-43763Privilege escalation3.3ImportantCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-44179Arbitrary code execution7.8CriticalCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-44180Arbitrary code execution7.8CriticalCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-44181Arbitrary code execution7.8CriticalCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-44182Privilege escalation3.3ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-44183Privilege escalation3.3ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-43751Privilege escalation3.3ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-40790Privilege escalation3.3Moderate
CVE-2021-40791Privilege escalation3.3ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-40795Arbitrary code execution7.8CriticalCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-42265Privilege escalation3.3ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-43756Arbitrary code execution 7.8Critical   CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-43757Arbitrary code execution7.8Critical
CVE-2021-43758Privilege escalation4ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-43759Privilege escalation4ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-43760Privilege escalation4ModerateCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-44697Privilege escalation3.3ModerateCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-44698Privilege escalation3.3ModerateCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-44699Privilege escalation3.3ModerateCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

Fix Adobe Products Affected with Multiple Vulnerabilities:

We recommend to take the required measures to fix your adobe products affected which are affected with these multiple vulnerabilities. Adobe has released updates for all the products listed as vulnerable. Please go through this list and update your products.

Adobe ProductFixed VersionPlatformSecurity Updates
Adobe Premiere Rush1.5.16  and earlier versions       Windowshttps://helpx.adobe.com/security/products/premiere_rush/apsb21-101.html
Adobe Experience Manager (AEM)AEM Cloud Service (CS)6.5.10.0 and earlier versions Allhttps://helpx.adobe.com/security/products/experience-manager/apsb21-103.html
Adobe Connect11.3  and earlier versions            Allhttps://helpx.adobe.com/security/products/connect/apsb21-112.html
Photoshop 202122.5.3 and earlier versions     Windows and macOShttps://helpx.adobe.com/security/products/photoshop/apsb21-113.html
Photoshop 202223.0.2 and earlier versionsWindows and macOShttps://helpx.adobe.com/security/products/photoshop/apsb21-113.html
Adobe Prelude 22.0  and earlier versions     Windowshttps://helpx.adobe.com/security/products/prelude/apsb21-114.html
Adobe After Effects22.0 and earlier versions     Windows and macOShttps://helpx.adobe.com/security/products/after_effects/apsb21-115.html
Adobe After Effects18.4.2 and earlier versions     Windows and macOShttps://helpx.adobe.com/security/products/after_effects/apsb21-115.html
Adobe Dimension3.4.3 and earlier versions      Windows and macOS https://helpx.adobe.com/security/products/dimension/apsb21-116.html
Adobe Premiere Pro 22.0 and earlier versions     Windows and macOShttps://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html
Adobe Premiere Pro 15.4.2 and earlier versions     Windows and macOShttps://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html
Adobe Media Encoder22.0 and earlier versionsWindows and macOShttps://helpx.adobe.com/security/products/media-encoder/apsb21-118.html
Adobe Media Encoder15.4.2 and earlier versionsWindows and macOShttps://helpx.adobe.com/security/products/media-encoder/apsb21-118.html
Lightroom 4.4 and earlier versions      Windowshttps://helpx.adobe.com/security/products/lightroom/apsb21-119.html
Adobe Audition22.0  and earlier versions          Windows and macOShttps://helpx.adobe.com/security/products/audition/apsb21-121.html
Adobe Audition14.4  and earlier versions          Windows and macOShttps://helpx.adobe.com/security/products/audition/apsb21-121.html

We hope this post will help you identify your Adobe products affected with multiple vulnerabilities. Thanks for reading this threat post. Please share this post and help to secure the digital world. Visit our social media page on FacebookLinkedInTwitterTelegramTumblr, & Medium and subscribe to receive updates like this.

About the author

Arun KL

To know more about me. Follow me on LinkedIn
Hi All, I am Arun KL, an IT Security Professional. Founder of “thesecmaster.com”. Enthusiast, Security Blogger, Technical Writer, Editor, Author at TheSecMaster. To know more about me. Follow me on LinkedIn

Leave a Reply

Your email address will not be published. Required fields are marked

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

Learn Something New with Free Email subscription

Email is also one of the ways to be in touch with us. Our free subscription plan offers you to receive post updates straight to your inbox.