

The Zero Day Initiative noted the most severe bugs here are the critical-rated use-after-free() and out-of-bounds write vulns. If exploited, they could allow for arbitrary code execution, memory leaks, security feature bypass, and privilege escalation, according to Adobe. The bulk of these are found in Adobe Acrobat and Reader and address 62 critical, important, and moderate vulnerabilities on Windows and macOS.

In total, it released four updates that address 78 vulnerabilities in its Acrobat and Reader, Photoshop, After Effects, and Adobe Commerce products. Adobe joins the patch partyĪdobe also issued a ton of fixes in its April patch event. These vulnerabilities would be appealing to ransomware operators because they have the potential to expose critical data, Breen added. "Again, that adds up to a wormable bug - at least between NFS servers." "On systems where the NFS role is enabled, a remote attacker could execute their code on an affected system with high privileges and without user interaction," Childs noted. Meanwhile, the two Windows Network File System (NFS) holes (CVE-2022-24491 and CVE-2022-24497), also received a 9.8 CVSS and Microsoft said exploitation is "more likely." "This could result in remote code execution on the server side with the same permissions as the RPC service," the security note detailed. Microsoft also advised blocking TCP port 445 at the perimeter firewall to prevent new attacks coming in from the internet. AWS fixes local file vuln on internal credential access for Relational Database ServiceĪ few other notable high-severity bugs in April's patch-a-looza include a remote procedure call runtime RCE vulnerability ( CVE-2022-26809) and two Windows Network File System RCE vulns ( CVE-2022-24491 and CVE-2022-24497).Īll three of these RCE bugs received a 9.8 CVSS score, which means they are about as bad as they come.ĬVE-2022-26809, which has a low attack complexity, is found in Microsoft's Remote Procedure Call (RPC) functionality. To exploit this bug, an attacker would send a specially crafted RPC to an RPC host machine, Microsoft explained.Apple patched critical flaws in macOS Monterey but not in Big Sur nor Catalina.Attackers exploit Spring4Shell flaw to let loose the Mirai botnet.Microsoft patches critical remote-code-exec hole in Exchange Server and others.So most of the legwork has already been done for would-be attackers. The requirements for exploitation are a little involved. Trend Micro's Dustin Childs noted on the Zero Day Initiative blog that not only does a proof-of-concept exploit exist for this bug, there's also a Metasploit module.
