Monday, June 9, 2025
HomeAdobeAdobe Security Update: Patches Released for Multiple Product Vulnerabilities

Adobe Security Update: Patches Released for Multiple Product Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

Adobe has announced critical security updates for several of its popular software products, addressing vulnerabilities that could potentially be exploited by attackers.

The Product Security Incident Response Team (PSIRT) has urged all users to apply these updates immediately to protect their systems and data.

These updates are part of Adobe’s ongoing commitment to ensuring the security of its products and services.

- Advertisement - Google News

The vulnerabilities addressed in these patches cover a wide range of Adobe products actively used by professionals and organizations worldwide.

Below is a summary of the affected products and their respective update announcements:

Bulletin IDProductRelease Date
APSB25-15Adobe ColdFusionApril 8, 2025
APSB25-23Adobe After EffectsApril 8, 2025
APSB25-24Adobe Media EncoderApril 8, 2025
APSB25-25Adobe BridgeApril 8, 2025
APSB25-26Adobe CommerceApril 8, 2025
APSB25-27Adobe AEM FormsApril 8, 2025
APSB25-28Adobe Premiere ProApril 8, 2025
APSB25-30Adobe PhotoshopApril 8, 2025
APSB25-31Adobe AnimateApril 8, 2025
APSB25-32Adobe AEM ScreensApril 8, 2025
APSB25-33Adobe FrameMakerApril 8, 2025
APSB25-34Adobe XMP Toolkit SDKApril 8, 2025

Key Highlights of the Security Updates

  1. Adobe ColdFusion (APSB25-15): A widely used platform for building modern web applications, ColdFusion received patches to address critical vulnerabilities that could lead to unauthorized access or code execution.
  2. Adobe Photoshop (APSB25-30): A leading photo editing software, Photoshop’s update mitigates risks linked to potential memory corruption issues.
  3. Adobe Premiere Pro (APSB25-28): Updates for this video editing tool fix vulnerabilities that could allow malicious actors to compromise files or systems.
  4. Adobe Bridge and AEM Products: Updates for Bridge, AEM Forms, and AEM Screens tackle flaws that might affect their integration and performance in enterprise environments.

The Adobe PSIRT team strongly recommends that all users update their products to the latest versions as soon as possible.

This will not only shield them from potential attacks but also ensure optimal performance of the applications.

Adobe has provided detailed instructions on how to install updates on its official security page.

Adobe encourages the security community to report vulnerabilities responsibly. PSIRT offers a streamlined platform for reporting issues and works collaboratively with researchers to ensure minimal risks to users.

As cyber threats become increasingly sophisticated, regular updates and proactive security measures are critical.

Adobe’s swift response to these vulnerabilities highlights its dedication to maintaining users’ trust and data integrity.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers

A newly identified information-stealing malware, crafted in the Rust programming language, has emerged as...

Hackers Leverage New ClickFix Tactic to Exploit Human Error with Deceptive Prompts

A sophisticated social engineering technique known as ClickFix baiting has gained traction among cybercriminals,...

Hundreds of Malicious GitHub Repos Targeting Novice Cybercriminals Traced to Single User

Sophos X-Ops researchers have identified over 140 GitHub repositories laced with malicious backdoors, orchestrated...

ClickFix Attack Uses Fake Cloudflare Verification to Silently Deploy Malware

A newly identified social engineering attack dubbed "ClickFix" has emerged as a significant threat,...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers

A newly identified information-stealing malware, crafted in the Rust programming language, has emerged as...

Hackers Leverage New ClickFix Tactic to Exploit Human Error with Deceptive Prompts

A sophisticated social engineering technique known as ClickFix baiting has gained traction among cybercriminals,...

Hundreds of Malicious GitHub Repos Targeting Novice Cybercriminals Traced to Single User

Sophos X-Ops researchers have identified over 140 GitHub repositories laced with malicious backdoors, orchestrated...