[CIVN-2026-0085] Multiple Vulnerabilities in Adobe Products

By Published On: February 13, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Adobe Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: CRITICAL


Software Affected


Adobe Audition versions prior to 25.6 and 26.0 for Windows and macOS

Adobe After Effects versions prior to 25.6.4 and 26.0 for Windows and macOS

Adobe InDesign versions prior to ID21.2 and ID20.5.2 for Windows and macOS

Adobe Substance 3D Designer versions prior to 15.1.2 for all platforms

Adobe Substance 3D Stager versions prior to 3.1.7 for Windows and macOS

Adobe Bridge versions prior to 15.1.4 (LTS) for Windows and macOS

Adobe Bridge versions prior to 16.0.2 for Windows and macOS

Adobe Substance 3D Modeler versions prior to 1.22.6 for All platforms

Lightroom Classic versions prior to 15.1.1 for All platforms

Lightroom Classic versions prior to 14.5.2 LTS for All platforms

Adobe DNG Software Development Kit (SDK) versions prior to DNG SDK 1.7.2 build 2410 for All platforms

Overview


Multiple Vulnerabilities have been reported in Adobe products which could be exploited by an attacker to execute arbitrary code, gain access to sensitive information, or can cause denial-of-service (DoS) condition on the targeted system.


Target Audience:

System administrators, Security teams or end-users of Adobe software products.


Risk Assessment:

High risk of unauthorized access to sensitive data, system compromise.


Impact Assessment:

Potential for data theft, remote code execution or service disruption.


Description


Multiple vulnerabilities exist in the Adobe products due to heap-based buffer overflow, out-of-bounds write, out-of-bounds read, use-after-free, integer overflow or wraparound, type confusion, NULL pointer dereference, and access of memory location after end of buffer issues.


Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, gain access to sensitive information, or can cause denial-of-service (DoS) condition on the targeted system.


Solution


Apply appropriate updates as mentioned in the Adobe Security Bulletin:

https://helpx.adobe.com/security/products/audition/apsb26-14.html


https://helpx.adobe.com/security/products/after_effects/apsb26-15.html


https://helpx.adobe.com/security/products/indesign/apsb26-17.html


https://helpx.adobe.com/security/products/substance3d_designer/apsb26-19.html


https://helpx.adobe.com/security/products/substance3d_stager/apsb26-20.html


https://helpx.adobe.com/security/products/bridge/apsb26-21.html


https://helpx.adobe.com/security/products/substance3d-modeler/apsb26-22.html


https://helpx.adobe.com/security/products/lightroom/apsb26-06.html


https://helpx.adobe.com/security/products/dng-sdk/apsb26-23.html



Vendor Information


Adobe

https://helpx.adobe.com/security.html


References


Adobe

https://helpx.adobe.com/security/products/audition/apsb26-14.html

https://helpx.adobe.com/security/products/after_effects/apsb26-15.html

https://helpx.adobe.com/security/products/indesign/apsb26-17.html

https://helpx.adobe.com/security/products/substance3d_designer/apsb26-19.html

https://helpx.adobe.com/security/products/substance3d_stager/apsb26-20.html

https://helpx.adobe.com/security/products/bridge/apsb26-21.html

https://helpx.adobe.com/security/products/substance3d-modeler/apsb26-22.html

https://helpx.adobe.com/security/products/lightroom/apsb26-06.html

https://helpx.adobe.com/security/products/dng-sdk/apsb26-23.html


CVE Name

CVE-2026-21312

CVE-2026-21313

CVE-2026-21314

CVE-2026-21315

CVE-2026-21316

CVE-2026-21317

CVE-2026-21318

CVE-2026-21319

CVE-2026-21320

CVE-2026-21321

CVE-2026-21322

CVE-2026-21323

CVE-2026-21324

CVE-2026-21325

CVE-2026-21326

CVE-2026-21327

CVE-2026-21328

CVE-2026-21329

CVE-2026-21330

CVE-2026-21332

CVE-2026-21334

CVE-2026-21335

CVE-2026-21336

CVE-2026-21337

CVE-2026-21338

CVE-2026-21339

CVE-2026-21340

CVE-2026-21341

CVE-2026-21342

CVE-2026-21343

CVE-2026-21344

CVE-2026-21345

CVE-2026-21346

CVE-2026-21347

CVE-2026-21348

CVE-2026-21349

CVE-2026-21350

CVE-2026-21351

CVE-2026-21352

CVE-2026-21353

CVE-2026-21354

CVE-2026-21355

CVE-2026-21357

CVE-2026-21358




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmPPBgACgkQ3jCgcSdc

ys+X3w//fwXBAt1KOokKed722kVUtloQe3eupk4tNGBUZW78GIH+MDE0x10idmbj

d1hRGV8RPLt+Qg2WTjm0gT8ebUotXYQy7JOJuXvd/1w8TQtAN+e8H/WUd7Rs8R9K

a7bWTlfmmIChM+Aituwth5Lm1BhIPdZMyTP1gqi5sf0MXZ/JOEQLQ+TBlo6RKxwQ

wPIgODHd64/kCLa0uAdBgWs4kG8z1aWqsuzJdUTmE+UT1sN2QZ4G4FmjI+Q/6/Gh

y9iLYaf+SNzFfgG6tloPnF5ZHQkwI/lb2V6Kv9W2m4qEkEbYCf3YwSlFyaoultL3

yGmaYXOvKqX58D+wYU0xfrUz1xR7X8F7ioKs0Z76j4C9kC6aeESboK06m9Nwzppg

HDDnSTfJ8zYxZzYw4MgVoxA+8Os7KWU5j/7OYmwQcjdNzPYsz9uhi5NOhtvXZEpK

AJhqHNy9aNuZYkclsHfPCKs/S7auTd5IYexdV1GkwoGMBGh3y2cEMjmHajLWdgqy

wjdeFDPondaX6oTQ1yZzvI0kd8ZadRu3LS+1LJRTMQGemBQE/YsuDhGk2Kfv3Uuc

DOpwpbtu+3PgKK3VXeDFuPK74a7XJ9QE8yF+TF7LnoWvFjgdurdTL6Atkw9Dt3TO

mqgBuSejEyVOGzkhOV//Vl7VPJIr69CESu/eWmwrJfZBSakiGqY=

=ws76

—–END PGP SIGNATURE—–

Share this article