Yesterday, Adobe issued an emergency advisory to notify users of Adobe Commerce and Magento about a critical zero-day vulnerability that has been exploited in attacks.
As per the tech giant’s threat data, the security issue is being used “in very limited attacks targeting Adobe Commerce merchants.”
To address the critical security flaw affecting its products, the American multinational computer software company has developed patches, which are delivered as MDVA-43395 EE 2.4.3-p1 v1.
The vulnerability has been identified as CVE-2022-24086, with a CVSS score of 9.8. It is characterized as an improper input validation issue that can result in arbitrary code execution. According to Adobe, the flaw can be abused without requiring authentication.
However, the California-based firm also stated that the flaw can only be exploited by hackers with administrative privileges.
The security vulnerability impacts Adobe Commerce (2.3.3-p1-2.3.7-p2) and Magento Open Source (2.4.0-2.4.3-p1), as well as earlier versions. Adobe Commerce versions prior to 2.3.3 are not affected.
Patches from Adobe can be downloaded and manually installed here.
Adobe has not given any other details about the attacks, and no one has been credited with disclosing the weakness.
According to SecurityWeek, the company declared that it is unable to discuss any additional information about the vulnerability in order to protect its customers’ privacy and security.
The company said that its internal security team was the one to find the vulnerability:
Our internal Adobe security team employs technologies that regularly monitor and help us identify and respond when issues occur.securityweek
The findings come after Sansec, an e-commerce malware and vulnerability detection firm, revealed last week that a Magecart attack impacted 500 sites powered by Magento 1 with a credit card skimmer intended to collect sensitive payment details.
The cybercriminals took advantage of a combination of vulnerabilities, as well as the fact that Magento 1 is no longer receiving security fixes.
This month, Adobe released patches for products including Premiere Rush, Illustrator, and Creative Cloud. Among other issues, the patch round addressed security flaws that could result in arbitrary code execution, Denial-of-Service (DoS), and privilege escalation.
You may also enjoy reading, CVEs You May Have Missed While Log4J Stole The Headlines
Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today
Remember, CyberSecurity Starts With You!
This post was last modified on 14 February 2022 1:11 PM
Five businesses have been fined a total of £435,000 (about $529,000) by Britain's data watchdog…
According to a new optional feature called Advanced Data Protection, end-to-end encryption will soon be…
Google, a leading search engine, fixed a newly discovered and actively exploited zero-day vulnerability in…
Fruits Mania, a well-known and trustworthy puzzle game, is one of the thousands of apps…
Microsoft and Mozilla have taken action against a certificate authority that is purportedly linked to…
Nvidia fixed more than two dozen security flaws in its GPU display driver, the most…