Adobe forced to patch its own failed security update
Company issues new fix for e-commerce vulnerability after researchers bypass the original update
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Adobe has had to issue another software update after an out-of-band patch failed to fix a vulnerability in its e-commerce software.
Last weekend, the company released an out-of-band patch to fix a vulnerability in its Adobe Commerce and Magento Open Source e-commerce products.
The CVE-2022-24086 input validation bug allowed attackers to run their own code on e-commerce sites, making them vulnerable to cart skimmers. The company said that the attack had been exploited in the wild.
Adobe credited the new discovery to one of the bug researchers that found the original vulnerability. The researcher from security company Bugscale, who uses the Twitter handle @Blaklis, warned about Adobe's first patch on Twitter. "THIS IS NOT SUFFICIENT to be safe," they said, adding a comment that hinted at the cause of the problem: "take care of json/url encoded values".
Researchers at security company Positive Technologies also warned that they had bypassed the initial patch to exploit the vulnerability again. "We weren't the first," they added.
The additional research created a new vulnerability ID, CVE-2022-24087. It mirrors the first bug's 9.8 (critical) rating. Adobe released a fix for the bug, which customers must apply on top of the first patch.
This isn't the first critical vulnerability that Adobe has had to patch lately. Earlier this month it issued a patch for a critical bug, CVE-2022-23202, that enabled attackers to execute their own code in its Creative Cloud Desktop application.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
It also patched an arbitrary code execution bug in Adobe After Effects, and another in Photoshop.
Danny Bradbury has been a print journalist specialising in technology since 1989 and a freelance writer since 1994. He has written for national publications on both sides of the Atlantic and has won awards for his investigative cybersecurity journalism work and his arts and culture writing.
Danny writes about many different technology issues for audiences ranging from consumers through to software developers and CIOs. He also ghostwrites articles for many C-suite business executives in the technology sector and has worked as a presenter for multiple webinars and podcasts.
-
Tomorrow's fraud techniquesITPro Podcast Leaders need to proactive as attackers launch more consistent, sophisticated attacks
-
Met Office hails huge efficiency gains in first year of cloud supercomputing with Microsoft AzureNews In moving to the cloud, the Met Office has bolstered operational resilience and helped to deliver more accurate forecasts
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches
