New Update Adobe Acrobat Reader DC Updates

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
9,365

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
9,365

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
9,365

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
9,365

Adobe Acrobat Reader DC 2023.003.20269​

23.003.20269 Planned update, Aug 08, 2023​

This release is a planned update for the products listed in the table below. The latest version is always available through the product’s update mechanism, and for some languages, from the Reader Download Center.

Track details​

The Acrobat product family introduces two tracks for both Acrobat and Reader which are essentially different products: “Classic” and “Continuous.” Most end users will install the Continuous track provided from the Reader Download Center. Enterprise organizations will user either the Classic or Continuous track. For details and a comparison of the two tracks, see Document Cloud Product Tracks — Deployment Planning and Configuration.
Source: 23.003.20269 Planned update, Aug 08, 2023 — Acrobat-Acrobat Reader Release Notes
 

Gandalf_The_Grey

Level 73
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 24, 2016
6,200
Adobe warns of critical Acrobat and Reader zero-day exploited in attacks
Adobe has released security updates to patch a zero-day vulnerability in Acrobat and Reader tagged as exploited in attacks.

Even though additional information on the attacks is yet to be disclosed, the zero-day is known to affect both Windows and macOS systems.

"Adobe is aware that CVE-2023-26369 has been exploited in the wild in limited attacks targeting Adobe Acrobat and Reader," the company said in a security advisory published today.

The critical security flaw is tracked as CVE-2023-26369 and can let attackers gain code execution after successfully exploiting an out-of-bounds write weakness.

While threat actors can exploit it in low-complexity attacks without requiring privileges, the flaw can only be exploited by local attackers, and it also requires user interaction, according to its CVSS v3.1 score.

CVE-2023-26369 was classified by Addobe with a maximum priority rating, with the company strongly advising administrators to install the update as soon as possible, ideally within a 72-hour window.

The complete list of affected products and versions is in the table below.

Product
Track
Affected Versions
Acrobat DC​
Continuous​
23.003.20284 and earlier​
Acrobat Reader DC​
Continuous​
23.003.20284 and earlier​
Acrobat 2020​
Classic 2020          ​
20.005.30516 (Mac) and earlier
20.005.30514 (Win) and earlier​
Acrobat Reader 2020​
Classic 2020          ​
20.005.30516 (Mac) and earlier
20.005.30514 (Win) and earlier​
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top