[CIVN-2026-0017] Multiple Vulnerabilities in Adobe Products

By Published On: January 14, 2026

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Adobe Products 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
Adobe Dreamweaver  21.6 and earlier versions for Windows & macOS
Adobe InDesign ID21.0 and earlier versions for Windows & macOS
Adobe InDesign ID19.5.5 and earlier versions for Windows & macOS
Illustrator 2025 29.8.3 and earlier versions for Windows 
Illustrator 2026 30.0 and earlier versions for Windows
Adobe InCopy  21.0 and earlier versions for Windows & macOS 
Adobe InCopy  19.5.5 and earlier versions for Windows & macOS
Adobe Bridge  15.1.2 (LTS) and earlier versions for Windows & macOS
Adobe Bridge  16.0 and earlier versions for Windows & macOS
Adobe Substance 3D Modeler 1.22.4 and earlier versions for All
Adobe Substance 3D Stager 3.1.5 and earlier versions for Windows & macOS
Adobe Substance 3D Painter 11.0.3 and earlier versions for All
Adobe Substance 3D Sampler 5.1.0 and earlier versions for All
ColdFusion 2025 Update 5 and earlier versions for All
ColdFusion 2023 Update 17 and earlier versions for All
Adobe Substance 3D Designer 15.0.3 and earlier versions for All
Overview
Multiple Vulnerabilities have been reported in Adobe products which could be exploited by an attacker to execute arbitrary code, data manipulation, obtain sensitive information or cause Denial of service (DoS) condition on the targeted system.
Target Audience:
System administrators, Security teams or end-users of Adobe software products.
Risk Assessment:
High risk of unauthorized access to sensitive data, system compromise.
Impact Assessment:
Potential for data theft, remote code execution or service disruption.
Description
Multiple vulnerabilities exist in Adobe products due to Improper Neutralization of Special Elements used in an OS Command injection, Improper Input Validation, Incorrect Authorization, Access of Uninitialized Pointer, Heap-based Buffer Overflow, Out-of-bounds Read, Write; Untrusted Search Path, NULL Pointer Dereference and Use After Free.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, data manipulation, obtain sensitive information or cause Denial of service (DoS) condition on the targeted system.
Solution
Apply appropriate updates as mentioned in the Adobe Security Bulletin.
https://helpx.adobe.com/security.html/security/security-bulletin.html
Vendor Information
Adobe
https://helpx.adobe.com/security.html/security/security-bulletin.html
https://helpx.adobe.com/security/products/dreamweaver/apsb26-01.html
https://helpx.adobe.com/security/products/indesign/apsb26-02.html
https://helpx.adobe.com/security/products/illustrator/apsb26-03.html
https://helpx.adobe.com/security/products/incopy/apsb26-04.html
https://helpx.adobe.com/security/products/bridge/apsb26-07.html
https://helpx.adobe.com/security/products/substance3d-modeler/apsb26-08.html
https://helpx.adobe.com/security/products/substance3d_stager/apsb26-09.html
https://helpx.adobe.com/security/products/substance3d_painter/apsb26-10.html
https://helpx.adobe.com/security/products/substance3d-sampler/apsb26-11.html
https://helpx.adobe.com/security/products/coldfusion/apsb26-12.html
https://helpx.adobe.com/security/products/substance3d_designer/apsb26-13.html
References
Adobe
https://helpx.adobe.com/security.html/security/security-bulletin.html
https://helpx.adobe.com/security/products/dreamweaver/apsb26-01.html
https://helpx.adobe.com/security/products/indesign/apsb26-02.html
https://helpx.adobe.com/security/products/illustrator/apsb26-03.html
https://helpx.adobe.com/security/products/incopy/apsb26-04.html
https://helpx.adobe.com/security/products/bridge/apsb26-07.html
https://helpx.adobe.com/security/products/substance3d-modeler/apsb26-08.html
https://helpx.adobe.com/security/products/substance3d_stager/apsb26-09.html
https://helpx.adobe.com/security/products/substance3d_painter/apsb26-10.html
https://helpx.adobe.com/security/products/substance3d-sampler/apsb26-11.html
https://helpx.adobe.com/security/products/coldfusion/apsb26-12.html
https://helpx.adobe.com/security/products/substance3d_designer/apsb26-13.html
CVE Name
CVE-2025-66516
CVE-2026-21267
CVE-2026-21268
CVE-2026-21271
CVE-2026-21272
CVE-2026-21274
CVE-2026-21275
CVE-2026-21276
CVE-2026-21277
CVE-2026-21278
CVE-2026-21280
CVE-2026-21281
CVE-2026-21283
CVE-2026-21287
CVE-2026-21288
CVE-2026-21298
CVE-2026-21299
CVE-2026-21300
CVE-2026-21301
CVE-2026-21302
CVE-2026-21303
CVE-2026-21304
CVE-2026-21305
CVE-2026-21306
CVE-2026-21308
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=4A6M
—–END PGP SIGNATURE—–

Share this article