Adobe Patches 55 Vulnerabilities Across 11 Products
Adobe patches 55 vulnerabilities across 11 products; 5 critical ColdFusion flaws marked priority 1.
Summary
Adobe released Patch Tuesday updates addressing 55 vulnerabilities across 11 products, with most rated priority 3 (low exploitation risk). However, five critical ColdFusion vulnerabilities received priority 1 rating due to the product's history of exploitation; these flaws allow security bypass, file read, and arbitrary code execution. The company is unaware of in-the-wild exploitation but recently patched a separate Acrobat/Reader zero-day (CVE-2026-34621) already exploited for months.
Full text
Adobe’s latest Patch Tuesday updates fix 55 vulnerabilities across 11 of the company’s products. Nearly all of the 11 new advisories have a priority rating of 3, which indicates that the software giant does not expect them to be exploited in attacks. However, an advisory describing five critical ColdFusion vulnerabilities has a priority rating of 1, indicating that companies should prioritize patching because the product has historically been targeted by threat actors. Several ColdFusion vulnerabilities have been exploited in attacks in recent years. The ColdFusion flaws patched with the latest updates can be exploited to bypass security features, read files from the system, and execute arbitrary code. Critical code execution vulnerabilities have also been patched in Acrobat Reader, InDesign, InCopy, FrameMaker, Connect, Bridge, Photoshop, and Illustrator.Advertisement. Scroll to continue reading. Important-severity issues — including ones allowing code execution, DoS attacks, and privilege escalation — were patched in Experience Manager Screens and the DNG SDK. The company is not aware of in-the-wild exploitation for any of the vulnerabilities. However, a few days ago Adobe announced patches for CVE-2026-34621, an Acrobat and Reader zero-day that appears to have been exploited for several months. In addition, CISA warned on Monday that it’s aware of attacks exploiting an old Acrobat and Reader vulnerability tracked as CVE-2020-9715. Related: SAP Patches Critical ABAP Vulnerability Related: Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000 Related: Orthanc DICOM Vulnerabilities Lead to Crashes, RCE Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs OpenAI Impacted by North Korea-Linked Axios Supply Chain HackInternational Operation Targets Multimillion-Dollar Crypto Theft SchemesCPUID Hacked to Serve Trojanized CPU-Z and HWMonitor DownloadsAdobe Patches Reader Zero-Day Exploited for MonthsChrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet UsersApple Intelligence AI Guardrails Bypassed in New AttackAdobe Reader Zero-Day Exploited for Months: Researcher Latest News ‘Mythos-Ready’ Security: CSA Urges CISOs to Prepare for Accelerated AI ThreatsEurope’s Largest Gym Chain Says Data Breach Impacts 1 Million MembersSAP Patches Critical ABAP VulnerabilityTriad Nexus Evades Sanctions to Fuel CybercrimeGoogle Adds Rust DNS Parser to Pixel Phones for Better SecurityNightclub Giant RCI Hospitality Reports Data BreachOrganizations Warned of Exploited Windows, Adobe Acrobat VulnerabilitiesBooking.com Says Hackers Accessed User Information Trending Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: A Step-by-Step Approach to AI Governance April 28, 2026 With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveThe United States Department of War appointed David Vaughn as Technical Advisor for Data Infrastructure.Black Duck has named Dom Glavach as Chief Information Security Officer.Finite State has named Ann Miller as Vice President of Marketing.More People On The MoveExpert Insights The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin) Why Agentic AI Systems Need Better Governance – Lessons from OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) The Human IOC: Why Security Professionals Struggle with Social Vetting Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb) Flipboard Reddit Whatsapp Whatsapp Email
Indicators of Compromise
- cve — CVE-2026-34621
- cve — CVE-2020-9715