Adobe Releases Emergency Patch for Exploited Commerce Zero-Day
Adobe released an emergency advisory on Sunday to inform Commerce and Magento users of a critical zero-day vulnerability that has been exploited in attacks.
The flaw, tracked as CVE-2022-24086 and assigned a CVSS score of 9.8, has been described as an improper input validation issue that can lead to arbitrary code execution. Adobe says the vulnerability can be exploited without authentication.
The security hole affects the Magento open source and Adobe Commerce e-commerce platforms, specifically versions 2.4.3-p1 and earlier and 2.3.7-p2 and earlier. Adobe has developed patches, which are delivered as MDVA-43395_EE_2.4.3-p1_v1.
The software giant says “CVE-2022-24086 has been exploited in the wild in very limited attacks targeting Adobe Commerce merchants.”
No other information has been provided about the attacks and Adobe has not credited anyone for reporting the vulnerability. SecurityWeek has reached out to the company for more details.
E-commerce software vulnerabilities are typically targeted in mass attacks. One recent example involved more than 500 online stores powered by Magento 1 targeted by cybercriminals whose goal was to plant web skimmers designed to harvest user data. The attackers exploited a combination of flaws and leveraged the fact that Magento 1 no longer receives security updates.
Ever since Adobe killed Flash, there have only been a few vulnerabilities in the company’s products that have been exploited in attacks. However, security bugs in Adobe products are still valuable.
Last month, Adobe patched Acrobat and Reader flaws that earned researchers $150,000 at China’s Tianfu Cup hacking contest, which took place in October 2021.