Adobe Security Bulletin

Security update available for Adobe Connect | APSB24-99

Bulletin ID

Date Published

Priority

APSB24-99

December 10, 2024

3

Summary

Adobe has released a security update for Adobe Connect. This update resolves critical, important and moderate vulnerabilities. Successful exploitation could lead to arbitrary code execution, privilege escalation and security feature bypass.

Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates.

Affected Product Versions

Product

Version

Platform

Adobe Connect

12.6  and earlier versions            

All

Adobe Connect

11.4.7 and earlier versions

All

Solution

Adobe categorizes these updates with the following  priority ratings and recommends users update their installation to the latest version.

Product

Version

Platform

Priority

Availability

Adobe Connect

12.7

All

3

Adobe Connect

11.4.9

All

3

Vulnerability Details

Vulnerability Category

Vulnerability Impact

Severity

CVSS base score 

CVE Number

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Critical

9.3

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

CVE-2024-54032

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Critical

8.0

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N

CVE-2024-54034

Improper Authorization (CWE-285)

Privilege escalation

Critical

7.3

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CVE-2024-54035

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Critical

9.3

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N

CVE-2024-54036

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Critical

7.3

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N

CVE-2024-54037

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

5.4

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVE-2024-54039

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

6.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVE-2024-49550

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

5.4

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVE-2024-54040

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

5.4

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVE-2024-54041

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

5.4

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVE-2024-54042

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

5.4

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVE-2024-54043

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

5.4

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

CVE-2024-54044

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

5.4

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

CVE-2024-54045

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

5.4

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

CVE-2024-54046

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

5.4

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

CVE-2024-54047

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

5.4

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

CVE-2024-54048

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

6.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVE-2024-54049

URL Redirection to Untrusted Site ('Open Redirect') (CWE-601)

Security feature bypass

Moderate

3.1

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

CVE-2024-54050

URL Redirection to Untrusted Site ('Open Redirect') (CWE-601)

Security feature bypass

Moderate

3.1

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

CVE-2024-54051

Improper Access Control (CWE-284)

Security feature bypass

Moderate

4.3

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE-2024-54038

Acknowledgments:

Acknowledgments

Adobe would like to thank the following researchers for reporting these issue and for working with Adobe to help protect our customers:   

  • lpi - CVE-2024-54040, CVE-2024-54041, CVE-2024-54042, CVE-2024-54043, CVE-2024-54044, CVE-2024-54045, CVE-2024-54046, CVE-2024-54047, CVE-2024-54048
  • Laish (a_l) - CVE-2024-54035, CVE-2024-54036, CVE-2024-54037, CVE-2024-54051
  • Naaash - CVE-2024-54032, CVE-2024-54038
  • fekirineakira (djallalakira) - CVE-2024-49550
  • Surajjj (ninetynine) - CVE-2024-54034
  • Charlie (moopinger) - CVE-2024-54039
  • Jorge Cerezo (zere) - CVE-2024-54049
  • Daniel Ferreira (ferreiraklet_) and Leonardo Campos (foorw1nner) - CVE-2024-54050

NOTE: Adobe has a public bug bounty program with HackerOne. If you are interested in working with Adobe as an external security researcher, please check out https://hackerone.com/adobe

Revisions

December 10, 2024 - CVE-2024-54033 and CVE-2024-54052 removed.

December 10, 2024 - CVE-2024-54050 credited as "Daniel Ferreira (ferreiraklet_) and Leonardo Campos (foorw1nner)"


For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com.

 Adobe

Get help faster and easier

New user?