HomeCyber BalkansAdobe alerts of ColdFusion vulnerability enabling hackers to access arbitrary files

Adobe alerts of ColdFusion vulnerability enabling hackers to access arbitrary files

Published on

spot_img

Adobe’s commitment to cybersecurity was highlighted as they issued a critical security update for ColdFusion versions 2023 and 2021 to address a major vulnerability that could potentially lead to an arbitrary file system read. The vulnerability, identified as CVE-2024-53961, is deemed critical due to the existence of a known proof-of-concept exploit, emphasizing the urgent need for users to update their systems.

This move by Adobe reaffirms the company’s dedication to ensuring the security and integrity of its products. The vulnerability, categorized as “Improper Limitation of a Pathname to a Restricted Directory” (CWE-22), poses a serious threat as it allows attackers to bypass security constraints and gain access to sensitive files. With a CVSS Base Score of 7.4, CVE-2024-53961 is classified as a high-severity issue, underlining the importance of addressing it promptly.

Affected versions of ColdFusion include ColdFusion 2023 (Update 11 and earlier) and ColdFusion 2021 (Update 17 and earlier). The vulnerability is exploitable remotely without the need for user interaction or prior privileges, significantly increasing its potential impact. Adobe has released new updates to mitigate the risks associated with CVE-2024-53961, urging users to update to the latest versions immediately as these patches are assigned a Priority Rating of “1,” signifying their utmost importance.

In addition to updating their systems, Adobe recommends upgrading the ColdFusion JDK/JRE to the latest Long-Term Support (LTS) version to further enhance security measures. To counter insecure Wddx deserialization attacks, Adobe has updated its serial filter documentation, advising users to review the updated guidelines and Security and Lockdown Guides for ColdFusion versions 2023 and 2021.

Security researcher ma4ter was credited by Adobe for reporting the vulnerability and contributing to the protection of ColdFusion users. The company also emphasizes its public bug bounty program on HackerOne, encouraging external researchers to collaborate on future security issues. To ensure full compliance and protection, ColdFusion users are urged to implement updated JVM flags as outlined in the updated security documentation and regularly review Adobe’s security resources and ColdFusion Lockdown Guides.

Overall, Adobe’s swift response to CVE-2024-53961 demonstrates their proactive approach in addressing vulnerabilities and safeguarding users. It is imperative for users to act promptly by installing the latest updates to secure their systems and mitigate potential risks. Strengthening cybersecurity measures and staying informed about the latest security guidelines is crucial in protecting against evolving cyber threats.

Source link

Latest articles

ENISA Aims for Premier Status in CVE Program

ENISA Strengthens Ties with CVE Program: A Strategic Move in Cybersecurity Collaboration The European Union...

Federal Employees Continue Using Claude Despite Trump Orders

Artificial Intelligence & Machine Learning, Government, ...

The Role of the Enterprise Supply Chain in Expanding the Global Attack Surface

For years, organizations have perceived cybersecurity as a safeguard primarily confined within their own...

Critical Nginx UI Tool Vulnerability Exposes Web Servers to Complete Compromise

Security Vulnerability Exposes Numerous Nginx Configurations to Potential Attacks In a troubling revelation, Pluto Security...

More like this

ENISA Aims for Premier Status in CVE Program

ENISA Strengthens Ties with CVE Program: A Strategic Move in Cybersecurity Collaboration The European Union...

Federal Employees Continue Using Claude Despite Trump Orders

Artificial Intelligence & Machine Learning, Government, ...

The Role of the Enterprise Supply Chain in Expanding the Global Attack Surface

For years, organizations have perceived cybersecurity as a safeguard primarily confined within their own...