
[CIVN-2026-0085] Multiple Vulnerabilities in Adobe Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Adobe Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
Adobe Audition versions prior to 25.6 and 26.0 for Windows and macOS
Adobe After Effects versions prior to 25.6.4 and 26.0 for Windows and macOS
Adobe InDesign versions prior to ID21.2 and ID20.5.2 for Windows and macOS
Adobe Substance 3D Designer versions prior to 15.1.2 for all platforms
Adobe Substance 3D Stager versions prior to 3.1.7 for Windows and macOS
Adobe Bridge versions prior to 15.1.4 (LTS) for Windows and macOS
Adobe Bridge versions prior to 16.0.2 for Windows and macOS
Adobe Substance 3D Modeler versions prior to 1.22.6 for All platforms
Lightroom Classic versions prior to 15.1.1 for All platforms
Lightroom Classic versions prior to 14.5.2 LTS for All platforms
Adobe DNG Software Development Kit (SDK) versions prior to DNG SDK 1.7.2 build 2410 for All platforms
Overview
Multiple Vulnerabilities have been reported in Adobe products which could be exploited by an attacker to execute arbitrary code, gain access to sensitive information, or can cause denial-of-service (DoS) condition on the targeted system.
Target Audience:
System administrators, Security teams or end-users of Adobe software products.
Risk Assessment:
High risk of unauthorized access to sensitive data, system compromise.
Impact Assessment:
Potential for data theft, remote code execution or service disruption.
Description
Multiple vulnerabilities exist in the Adobe products due to heap-based buffer overflow, out-of-bounds write, out-of-bounds read, use-after-free, integer overflow or wraparound, type confusion, NULL pointer dereference, and access of memory location after end of buffer issues.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, gain access to sensitive information, or can cause denial-of-service (DoS) condition on the targeted system.
Solution
Apply appropriate updates as mentioned in the Adobe Security Bulletin:
https://helpx.adobe.com/security/products/audition/apsb26-14.html
https://helpx.adobe.com/security/products/after_effects/apsb26-15.html
https://helpx.adobe.com/security/products/indesign/apsb26-17.html
https://helpx.adobe.com/security/products/substance3d_designer/apsb26-19.html
https://helpx.adobe.com/security/products/substance3d_stager/apsb26-20.html
https://helpx.adobe.com/security/products/bridge/apsb26-21.html
https://helpx.adobe.com/security/products/substance3d-modeler/apsb26-22.html
https://helpx.adobe.com/security/products/lightroom/apsb26-06.html
https://helpx.adobe.com/security/products/dng-sdk/apsb26-23.html
Vendor Information
Adobe
https://helpx.adobe.com/security.html
References
Adobe
https://helpx.adobe.com/security/products/audition/apsb26-14.html
https://helpx.adobe.com/security/products/after_effects/apsb26-15.html
https://helpx.adobe.com/security/products/indesign/apsb26-17.html
https://helpx.adobe.com/security/products/substance3d_designer/apsb26-19.html
https://helpx.adobe.com/security/products/substance3d_stager/apsb26-20.html
https://helpx.adobe.com/security/products/bridge/apsb26-21.html
https://helpx.adobe.com/security/products/substance3d-modeler/apsb26-22.html
https://helpx.adobe.com/security/products/lightroom/apsb26-06.html
https://helpx.adobe.com/security/products/dng-sdk/apsb26-23.html
CVE Name
CVE-2026-21312
CVE-2026-21313
CVE-2026-21314
CVE-2026-21315
CVE-2026-21316
CVE-2026-21317
CVE-2026-21318
CVE-2026-21319
CVE-2026-21320
CVE-2026-21321
CVE-2026-21322
CVE-2026-21323
CVE-2026-21324
CVE-2026-21325
CVE-2026-21326
CVE-2026-21327
CVE-2026-21328
CVE-2026-21329
CVE-2026-21330
CVE-2026-21332
CVE-2026-21334
CVE-2026-21335
CVE-2026-21336
CVE-2026-21337
CVE-2026-21338
CVE-2026-21339
CVE-2026-21340
CVE-2026-21341
CVE-2026-21342
CVE-2026-21343
CVE-2026-21344
CVE-2026-21345
CVE-2026-21346
CVE-2026-21347
CVE-2026-21348
CVE-2026-21349
CVE-2026-21350
CVE-2026-21351
CVE-2026-21352
CVE-2026-21353
CVE-2026-21354
CVE-2026-21355
CVE-2026-21357
CVE-2026-21358
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=ws76
—–END PGP SIGNATURE—–


