Adobe – Gridinsoft Blog https://gridinsoft.com/blogs Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Mon, 01 Dec 2025 00:51:32 +0000 en-US hourly 1 https://wordpress.org/?v=6.9 Adobe Commerce Vulnerability CosmicSting Exploited, Fix Now https://gridinsoft.com/blogs/adobe-commerce-vulnerability-exploited/ https://gridinsoft.com/blogs/adobe-commerce-vulnerability-exploited/#respond Tue, 08 Oct 2024 14:18:29 +0000 https://gridinsoft.com/blogs/?p=27548 Running an online shop with Adobe Commerce? Check your software versions, as you may be vulnerable

The post Adobe Commerce Vulnerability CosmicSting Exploited, Fix Now appeared first on Gridinsoft Blog.

]]>
A research with Darknet monitoring utilities uncovered an active exploitation of a flaw present in Adobe Commerce (previously known as Magento). Quite a few versions of the software suite contain RCE vulnerability that potentially allow exfiltrating user data and manipulate page data. As there is no need for user/admin interaction for successful exploitation, it was expected to see the CVSS 9.8 rating.

Adobe Commerce/Magento Software Vulnerability Exploitation Uncovered

The original vulnerability, coded CVE-2024-34102, was discovered back in late June 2024, with all the corresponding reports and patches from Adobe. The description of the vulnerability clearly shows it is not too hard to exploit, which was reflected in the critical severity rating of 9.8. As all the required patches were released along with the vulnerability disclosure, the remediation steps were pretty straightforward.

Security bulletin Adobe Commerce CosmicSting
Official Adobe notification

But, as it usually happens, the disclosure of the vulnerability threw it into a spotlight of cybercriminals. As SOCRadar researchers discovered, 4275 online stores powered with Adobe Commerce were compromised, with the use of this exact flaw. That number is around 5% (!) of all online stores that use this software, and it keeps growing as hackers manage to retain the attack rate at 3-5 successful hacks per hour.

Among the most popular mischiefs that the researchers have noticed is setting up a skimmer at the checkout page. Once the visitor types the credit card data to pay for ordered items, the script that the hackers managed to embed with the use of this vulnerability will send all the data to the cybercriminals’ servers. It is also possible to facilitate stealing of other data types with the same exploit, as it allows modifying the final website’s interactive elements. The vast majority of these hacks appear automated, i.e. the exploit is simple enough and there are not many variable parameters that may require manual control.

The vulnerability itself falls under the CWE-611 designation – improper restriction of XML external entity reference. It is pretty self-explanatory: the program handles all URLs present in the XML documents as valid references, which eventually allows it to manipulate the output. As XMLs are essential for web development, the potential attack surface effectively extends to the entirety of Adobe Commerce user base.

Adobe Commerce CosmicSting Vulnerability Fix

As I’ve mentioned above, Adobe released the fix simultaneously with the disclosure of this vulnerability. That gives an obvious fix advice: just install the latest updates for Adobe Commerce, and you’re good to go. The following versions are known to contain the vulnerability, according to the original Adobe report:

2.4.4-p8
2.4.5-p7
2.4.6-p5
2.4.7 and earlier

Another advice that Adobe recommends all customers to apply is changing the secret encryption keys. This is needed to prevent the hackers from using potentially leaked ones, so it is also important to ensure that old encryption keys are invalidated.

Researchers from Sansec also offer a temporary fix, that should be enough to prevent exploitation until it is possible to install the proper update. To do this, they offer administrators to block all the requests to the CMS block API, a part that is getting manipulated during the attack. As it won’t take any new requests, adversaries won’t be able to create the aforementioned checkout skimmers and do other mischiefs.

Adobe Commerce Vulnerability CosmicSting Exploited, Fix Now

The post Adobe Commerce Vulnerability CosmicSting Exploited, Fix Now appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/adobe-commerce-vulnerability-exploited/feed/ 0
CCXProcess.exe: What It Is, Why It’s Running, and How to Stop It https://gridinsoft.com/blogs/ccxprocess-exe/ https://gridinsoft.com/blogs/ccxprocess-exe/#respond Thu, 13 Jun 2024 18:49:09 +0000 https://gridinsoft.com/blogs/?p=22183 CCXProcess.exe confuses a lot of people when they open Task Manager. The process runs in the background, starts automatically with Windows, and most users never launched it themselves. If you’re wondering whether it’s safe or what it does, you’re in the right place. This guide explains what CCXProcess.exe is, how to tell if it’s legitimate […]

The post CCXProcess.exe: What It Is, Why It’s Running, and How to Stop It appeared first on Gridinsoft Blog.

]]>
CCXProcess.exe confuses a lot of people when they open Task Manager. The process runs in the background, starts automatically with Windows, and most users never launched it themselves. If you’re wondering whether it’s safe or what it does, you’re in the right place.

This guide explains what CCXProcess.exe is, how to tell if it’s legitimate or malware, and how to fix common problems like high CPU usage and DLL errors. Everything here comes from real troubleshooting experience with Adobe Creative Cloud.

Process Summary

Process Name CCXProcess.exe
Legitimate Publisher Adobe Systems Incorporated
Primary Function Adobe Creative Cloud background service, content delivery, updates
Typical Location C:\Program Files\Adobe\Adobe Creative Cloud Experience\
Resource Usage Low CPU and memory consumption (typically 30-50MB, under 2% CPU)
Security Risk Safe when legitimate, High Risk if impersonated
Common Issues MSVCP140.dll errors, malware impersonation, startup delays, unexpected resource usage

Understanding CCXProcess.exe: What It Actually Does

CCXProcess.exe is the Adobe Creative Cloud Experience process, a background service that powers several critical functions for Adobe’s Creative Cloud ecosystem. Unlike the main Creative Cloud desktop application you can see and interact with, CCXProcess works silently behind the scenes to keep your Adobe experience seamless.

Here’s what it actually does in practical terms:

  • Dynamic Content Delivery: When you open Photoshop and browse stock photos, download preset filters, or access tutorial content directly within the app, CCXProcess is handling those connections and downloads in the background.
  • Cloud Synchronization: If you save documents to Creative Cloud or sync settings across devices, this process manages the file transfers and synchronization operations.
  • Background Updates: Rather than interrupting your work with update prompts, CCXProcess quietly downloads and prepares updates for your Adobe applications, similar to how other system processes handle maintenance tasks.
  • License Verification: It periodically checks your subscription status and validates your license, ensuring you have uninterrupted access to Adobe services.
CCXProcess.exe screenshot
CCXProcess.exe in the Task Manager

The process automatically launches at system startup after you install any Adobe Creative Cloud application—Premiere Pro, Lightroom Classic, After Effects, Photoshop, Illustrator, or any other CC app. This auto-start behavior is intentional and necessary for the seamless operation of Adobe’s cloud features, though it understandably concerns users who prefer to control what runs at startup.

Normal behavior characteristics: In its normal state, CCXProcess.exe should consume minimal resources—typically 30-50MB of memory and less than 2% CPU usage when idle. You might see brief spikes to 5-10% CPU when it’s actively syncing files or downloading content, but sustained high resource usage is not normal and indicates a problem that needs investigation.

The MSVCP140.dll Error: Complete Fix Guide

The “MSVCP140.dll is missing” error is frustratingly common with Adobe software, and I’ve helped countless users resolve it. This error prevents CCXProcess.exe and other Adobe applications from launching altogether, displaying an error dialog that stops you in your tracks.

Why this error happens: The MSVCP140.dll file is part of the Microsoft Visual C++ Redistributable package (originally introduced in 2015, now distributed as the 2015-2022 unified package). This package contains runtime libraries that many Windows applications depend on to function. Adobe software heavily relies on these libraries, but they’re not always pre-installed on Windows systems, especially on fresh installations or after certain system updates. This type of dependency issue affects many professional applications, not just Adobe products.

MSVCP140.dll error screenshot
MSVCP140.dll error

Method 1: Install Microsoft Visual C++ 2015-2022 Redistributable (Recommended)

  1. Visit Microsoft’s official Visual C++ Redistributable download page
  2. Download the Visual C++ 2015-2022 Redistributable – you need both x64 (vc_redist.x64.exe) and x86 (vc_redist.x86.exe) versions for full compatibility
  3. Run both installers—even if it says a version is already installed, allow it to repair or update
  4. Restart your computer (this step is critical; don’t skip it)
  5. Launch your Adobe application to verify the error is resolved

Method 2: Repair or Reinstall Existing Visual C++ Packages

If Method 1 doesn’t work, the issue might be corrupted existing installations rather than missing files:

  1. Open Windows SettingsAppsInstalled apps (or Control Panel → Programs and Features)
  2. Find all entries labeled “Microsoft Visual C++ Redistributable”
  3. For each Visual C++ package, click the three dots (or right-click) and select ModifyRepair
  4. If Repair doesn’t work, uninstall all Visual C++ packages, restart your computer, then install the latest 2015-2022 package fresh
  5. Restart your computer after reinstalling

Method 3: Manual DLL Replacement (Advanced Users Only)

While I don’t generally recommend manually downloading DLL files from third-party sites due to security risks, if you’re experienced and the above methods fail, you can extract MSVCP140.dll from the Visual C++ package and place it in your system directory. However, this approach often creates more problems than it solves because it doesn’t resolve underlying dependency issues.

Prevention tip: After resolving this error, I recommend keeping Windows Update enabled and running regularly. Microsoft periodically updates the Visual C++ Redistributables through Windows Update, which prevents these errors from recurring.

Should You Disable CCXProcess.exe?

This is one of the most frequent questions I receive, and the answer depends entirely on how you use Adobe software. Let me break down the practical implications to help you make an informed decision.

What happens if you disable it:

  • You won’t receive background updates for Adobe applications—updates will only check when you manually open Creative Cloud
  • Cloud sync functionality will be disabled; files won’t sync automatically across devices
  • In-app content like stock photos, templates, and tutorials won’t load properly
  • You may experience delays when launching Adobe applications, as some services won’t be pre-loaded
  • License validation may be delayed, potentially causing brief “verifying subscription” messages

When disabling makes sense: If you rarely use Adobe software, work exclusively with local files (no cloud sync), and don’t mind manual updates, disabling CCXProcess can free up a small amount of system resources and reduce startup processes. This is particularly relevant for users on older computers with limited RAM or those who prioritize startup speed.

When you should keep it enabled: If you use Adobe apps daily, collaborate with others via cloud sharing, or rely on cloud-synced settings and assets, keeping CCXProcess enabled ensures a seamless experience without interruptions.

How to temporarily stop CCXProcess.exe:

  1. Press Ctrl+Shift+Esc to open Task Manager (or right-click the taskbar and select Task Manager)
  2. Locate CCXProcess.exe under the “Processes” tab (sort by name if needed)
  3. Right-click on CCXProcess.exe and select “End task
  4. The process will terminate immediately but will restart when you launch an Adobe application or reboot

How to disable CCXProcess.exe from auto-starting (Method 1 – Recommended):

  1. Open the Adobe Creative Cloud desktop application
  2. Click your profile icon in the upper-right corner
  3. Select Preferences from the dropdown menu
  4. Navigate to the General tab
  5. Uncheck “Launch Creative Cloud at Login
  6. This prevents both the Creative Cloud app and CCXProcess from auto-starting

How to disable via Windows Startup settings (Method 2):

  1. Open Task Manager (Ctrl+Shift+Esc)
  2. Click the Startup tab at the top
  3. Find “Adobe Creative Cloud” or “CCXProcess” in the list
  4. Right-click and select Disable
  5. This prevents auto-start but doesn’t affect the process when Adobe apps are running

My recommendation: For most users, I suggest keeping it enabled but monitoring resource usage. If you notice it consuming excessive resources (covered in the next section), that indicates a problem requiring investigation rather than a reason to disable the legitimate process.

Is CCXProcess.exe a Virus? Critical Security Indicators

The legitimate CCXProcess.exe from Adobe is absolutely not a virus—it’s digitally signed by Adobe Systems and serves essential functions. However, malware authors frequently impersonate legitimate processes to avoid detection, and CCXProcess.exe is a popular target for this deception. I’ve personally analyzed numerous cases where malware disguised itself as this process, so knowing how to verify legitimacy is crucial.

Critical Check #1: Do you have Adobe Creative Cloud installed?

This is the most obvious but often overlooked check. If you’ve never installed Adobe software—no Photoshop, no Premiere Pro, no Illustrator—yet CCXProcess.exe appears in your Task Manager, it’s almost certainly malware. Some users inherit computers from others or purchase used systems, so check your Programs list (Control Panel → Programs and Features) to confirm whether Adobe Creative Cloud is installed before jumping to conclusions.

Critical Check #2: Resource consumption patterns

The legitimate CCXProcess.exe is remarkably lightweight. Based on my testing across various systems, normal resource usage looks like this:

  • Memory: 30-70MB consistently (occasionally up to 100MB during sync operations)
  • CPU: 0-2% when idle, brief spikes to 5-10% during file sync or content downloads
  • Disk: Minimal disk activity except during updates or syncing
  • Network: Periodic small transfers for license checks; larger transfers only when syncing or downloading content

Red flags indicating malware:

  • Sustained CPU usage above 20% with no Adobe applications open
  • Memory consumption growing continuously (memory leak behavior)
  • Constant high disk or network activity when you’re not using Adobe software
  • Multiple instances of CCXProcess.exe running simultaneously (legitimate Adobe runs just one)

These patterns strongly suggest cryptocurrency mining malware or other resource-hijacking threats that commonly impersonate legitimate processes. Coin miners particularly favor this disguise because users expect some resource usage from Adobe software.

Critical Check #3: File location verification

The legitimate CCXProcess.exe resides in a very specific location. Here’s how to verify:

  1. Open Task Manager (Ctrl+Shift+Esc)
  2. Find CCXProcess.exe in the process list
  3. Right-click on it and select “Open file location
  4. Windows will open File Explorer showing the exact folder containing the executable

Legitimate locations:

  • 64-bit Windows: C:\Program Files\Adobe\Adobe Creative Cloud Experience\
  • 32-bit Windows: C:\Program Files (x86)\Adobe\Adobe Creative Cloud Experience\
Legit file location screenshot
Location of a legitimate file

Suspicious locations indicating malware:

  • C:\Windows\System32\
  • C:\Windows\SysWOW64\
  • C:\Users\[YourName]\AppData\Local\Temp\
  • C:\Users\[YourName]\AppData\Roaming\
  • Any folder with random character names

Malware in these locations is attempting to appear as a system file or hide in temporary directories. This is a common characteristic of trojan infections that disguise themselves as legitimate software.

Critical Check #4: Digital signature verification

Legitimate software from Adobe is always digitally signed. Here’s how to verify:

  1. Right-click on the CCXProcess.exe file (after using “Open file location” from Task Manager)
  2. Select Properties
  3. Click the Digital Signatures tab
  4. Verify that “Adobe Systems Incorporated” appears as the signer
  5. Click Details and then View Certificate to see full certificate information

If there’s no Digital Signatures tab, or if the signer is anything other than “Adobe Systems Incorporated,” you’re dealing with malware.

What to do if you suspect malware:

If any of the above checks raise red flags, don’t simply delete the file or end the process—sophisticated malware often has persistence mechanisms that will recreate the file. Instead, run a comprehensive system scan with proven anti-malware software. GridinSoft Anti-Malware is specifically designed to detect process impersonation and remove stubborn malware that disguises itself as legitimate software.

Troubleshooting Other Common CCXProcess.exe Issues

Beyond the MSVCP140.dll error and malware concerns, users encounter several other recurring problems with CCXProcess.exe. Here are the issues I most frequently help users resolve, with detailed solutions based on real-world experience.

Issue #1: CCXProcess.exe Causing Slow Startup

Many users report that Windows startup is noticeably slower with CCXProcess enabled. While the process itself launches quickly, it can trigger a chain of other Adobe services and network checks that delay usability by 10-30 seconds on some systems.

Solution: Rather than disabling it completely, adjust the startup timing. Open Task Manager, go to the Startup tab, and set Adobe Creative Cloud to “Disabled.” Then, create a scheduled task (using Windows Task Scheduler) that launches Creative Cloud 2-3 minutes after startup. This gives your system time to complete critical startup procedures before Adobe services load, improving perceived performance without losing functionality.

Issue #2: Frequent “Application Error” Messages

Some users see repeated errors like “CCXProcess.exe – Application Error” reporting that the application was unable to start correctly (0xc000007b or similar error codes).

Solution: This typically indicates corrupted Adobe Creative Cloud installation files. The fix:

  1. Download the Creative Cloud Cleaner Tool from Adobe’s official support site
  2. Run it to completely remove all Creative Cloud components
  3. Restart your computer
  4. Download a fresh Creative Cloud installer from Adobe.com
  5. Reinstall Creative Cloud and your Adobe applications

This nuclear option resolves corrupted installations that partial repairs can’t fix. I know it’s time-consuming, but it’s the most reliable solution for persistent application errors.

Issue #3: CCXProcess.exe Not Responding

The process occasionally freezes, showing “Not Responding” in Task Manager and preventing Adobe applications from launching or functioning properly.

Solution: First, check your internet connection—many “not responding” states occur when CCXProcess can’t reach Adobe’s license servers. Try these steps:

  1. Verify your internet connection is stable
  2. Temporarily disable VPN or proxy if you’re using one (these can block Adobe’s license checks)
  3. Check if your firewall is blocking Adobe connections
  4. End the CCXProcess.exe task and relaunch it via the Creative Cloud app

If the problem persists, the Adobe licensing service may have corrupted cache files. Navigate to C:\ProgramData\Adobe and delete (or rename for backup) the SLCache folder. Restart Creative Cloud, and it will rebuild the license cache.

Issue #4: High Memory Usage Even When Idle

While I mentioned normal memory usage earlier (30-70MB), some users report CCXProcess consuming 200MB+ even with no Adobe applications running.

Solution: First, verify this is the legitimate Adobe process using the security checks outlined earlier—abnormal memory usage can indicate malware. If it’s legitimate, excessive memory consumption often results from Creative Cloud trying to sync large libraries or corrupted sync data. Try:

  1. Open Creative Cloud preferences
  2. Go to “Creative Cloud” → “Files”
  3. Pause syncing temporarily to see if memory usage drops
  4. If memory normalizes, you likely have corrupted sync data or an unusually large sync queue
  5. Check your Creative Cloud Files folder for any extremely large files or folders that might be causing sync issues

For persistent issues with the legitimate CCXProcess.exe, I recommend ensuring both Adobe Creative Cloud and Windows are fully updated. Adobe regularly releases updates that fix resource management bugs, and Windows updates often include compatibility improvements. Similar to how malware behavior can disguise itself as legitimate high resource usage, distinguishing between buggy software and malicious activity requires methodical testing.

Prevention and Security Best Practices

Based on years of helping users secure their systems against malware impersonation and related threats, here are my tested recommendations for protecting yourself while using Adobe Creative Cloud.

1. Source Control: Only Download Adobe Software from Official Sources

This sounds obvious, but it’s the single most effective prevention strategy. The vast majority of CCXProcess.exe malware infections originate from cracked Adobe software or unofficial installers. These pirated versions bundle cryptocurrency miners, trojans, and other malware alongside functional (or semi-functional) Adobe applications.

Legitimate Adobe download sources:

  • Adobe.com (official website)
  • Creative Cloud desktop app (for updates and additional apps)
  • Microsoft Store (for select Adobe applications)

Avoid torrent sites, crack forums, “free Adobe” websites, and file-sharing platforms. The money you might save on a subscription isn’t worth the security risks, data theft, and system cleanup costs that follow malware infections.

2. Implement Regular System Monitoring

Don’t just set up your Adobe software and forget about it. Develop a habit of periodically checking Task Manager resource usage:

  • Weekly: Open Task Manager and glance at CPU and memory consumption, looking for anything unusual
  • Monthly: Sort processes by CPU and memory usage to identify any abnormal patterns
  • After any system changes: Check Task Manager whenever you install new software, especially if you notice performance degradation

This proactive approach helps you catch problems early, before they cause significant issues or data loss.

3. Maintain Updated Security Software

Windows Defender (Windows Security) provides decent baseline protection and should always be enabled with real-time protection active. However, I recommend supplementing it with specialized anti-malware software that excels at detecting process impersonation and advanced threats.

GridinSoft Anti-Malware, for example, specifically monitors for suspicious process behavior patterns that indicate malware disguising itself as legitimate software—exactly the type of threat that impersonates CCXProcess.exe. Schedule regular scans (at least weekly) and keep your security software updated so it recognizes the latest malware variants.

4. Recognize Red Flags for Fake Software Installations

If you don’t actively use Adobe Creative Cloud applications, CCXProcess.exe appearing on your system is an immediate red flag requiring investigation. This scenario commonly indicates bundled malware from fake installers—you might have downloaded what you thought was a simple PDF converter or image editor, only to have it install malware disguised as Adobe processes.

Other warning signs:

  • Adobe processes appearing after installing completely unrelated software
  • Multiple “Adobe” processes you don’t recognize running simultaneously
  • Adobe-related startup items when you’ve never installed Adobe software
  • Unexpected Adobe folders in Program Files when you don’t have a Creative Cloud subscription

If you encounter these situations, don’t ignore them—run a comprehensive system scan immediately. The longer malware operates undetected, the more damage it can cause and the more data it can exfiltrate.

5. Use Windows Firewall to Monitor Network Activity

For advanced users, Windows Firewall logs can reveal suspicious network behavior. The legitimate CCXProcess.exe connects to Adobe’s servers (primarily adobe.com, adobe.io, and related domains) for license checks and content delivery. If you notice connections to unusual domains, cryptocurrency mining pools, or suspicious IP addresses, that’s a strong indicator of malware impersonation.

6. Keep Software Updated

Both Adobe Creative Cloud and Windows should be kept current with the latest updates. Adobe regularly patches security vulnerabilities and bugs that could be exploited by malware, while Windows updates include security improvements and compatibility fixes that reduce system vulnerabilities.

If you suspect CCXProcess.exe is actually malware on your system, remove it immediately using professional anti-malware software. GridinSoft Anti-Malware will thoroughly scan your system, identify malicious processes masquerading as CCXProcess.exe, and safely remove them while restoring your system security. Don’t attempt manual removal unless you’re highly experienced—malware often has multiple persistence mechanisms that require specialized removal techniques.

GridinSoft Anti-Malware main screen

Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.

After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click "Advanced mode" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.

Scan results screen

Click "Clean Now" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.

Removal finished

Frequently Asked Questions

What is CCXProcess.exe and why is it running on my computer?

CCXProcess.exe is the Adobe Creative Cloud Experience background service that manages essential functions for Adobe applications. It handles dynamic content delivery (downloading templates, stock assets, and tutorials directly in Adobe apps), cloud file synchronization across devices, background software updates, and license verification for your Creative Cloud subscription. It runs automatically after you install any Adobe Creative Cloud application and starts with Windows by default to ensure these services are always available when you need them.

How can I tell if CCXProcess.exe is legitimate or malware?

Verify legitimacy using four critical checks: (1) Confirm you have Adobe Creative Cloud software installed—if you don’t, it’s almost certainly malware. (2) Check resource usage—legitimate CCXProcess uses under 50MB RAM and under 2% CPU normally; sustained high usage indicates a problem. (3) Verify file location via Task Manager’s “Open file location” option—it should be in C:\Program Files\Adobe\Adobe Creative Cloud Experience\ (or Program Files (x86) on some systems), not in Windows system folders or temp directories. (4) Check the digital signature by right-clicking the file, selecting Properties, and viewing the Digital Signatures tab—it must show “Adobe Systems Incorporated” as the signer.

Is it safe to disable or end CCXProcess.exe?

Yes, it’s completely safe to terminate CCXProcess.exe through Task Manager or disable it from startup—doing so won’t damage your system or Adobe software. However, disabling it removes several conveniences: automatic background updates, cloud synchronization, in-app content downloads, and pre-loaded services that speed up Adobe application launches. If you rarely use Adobe software, disabling CCXProcess can free up system resources and reduce startup processes. For daily Adobe users who rely on cloud features and automatic updates, keeping it enabled provides a significantly better experience. You can always disable it temporarily and re-enable it later based on your needs.

What causes the MSVCP140.dll error and how do I fix it?

The MSVCP140.dll error occurs when the Microsoft Visual C++ 2015 Redistributable package is missing or corrupted on your system. This package contains runtime libraries that many applications, including Adobe software, require to function. To fix it, download and install the latest Visual C++ Redistributable (both x86 and x64 versions) from Microsoft’s official download page, then restart your computer. If that doesn’t resolve the issue, you may need to specifically install the Visual C++ 2015 Redistributable version. In some cases, you’ll need to uninstall existing Visual C++ packages first if they’re preventing the installation, then install the 2015 version and restart.

Why is CCXProcess.exe using high CPU or memory?

Abnormally high resource usage from CCXProcess.exe typically indicates one of three issues: (1) Malware impersonating the legitimate process—verify file location and digital signature immediately. (2) Large cloud sync operations—check if you have many files queued for synchronization in Creative Cloud Files; pausing sync temporarily can confirm this. (3) Corrupted Adobe Creative Cloud installation—try updating Creative Cloud to the latest version or using Adobe’s Creative Cloud Cleaner Tool to remove and reinstall it completely. Legitimate CCXProcess.exe should use minimal resources (under 50MB RAM, under 2% CPU) when idle, with only brief spikes during active sync or content downloads. Sustained usage above 10-20% CPU or 200MB+ memory warrants immediate investigation.

Can I permanently remove CCXProcess.exe from my computer?

You can prevent CCXProcess.exe from running by either disabling Adobe Creative Cloud from launching at startup (via Creative Cloud Preferences → “Launch Creative Cloud at Login” option) or by completely uninstalling Adobe Creative Cloud and all Adobe applications from your system through Windows Programs and Features. Simply deleting the CCXProcess.exe file without uninstalling Adobe software will cause errors and malfunctions in your Adobe applications, since they depend on this process for various functions. If you don’t use Adobe software at all and CCXProcess.exe is present, it’s likely malware that should be removed using anti-malware software rather than manual deletion.

Does CCXProcess.exe need internet access?

Yes, CCXProcess.exe requires internet connectivity to perform most of its functions, including license verification, cloud synchronization, content downloads, and checking for software updates. If you block its internet access through your firewall, you may experience limited functionality in Adobe applications—specifically, cloud features won’t work, in-app content downloads will fail, and you might see subscription verification errors. The process connects primarily to Adobe’s official domains (adobe.com, adobe.io, and related servers). If you notice CCXProcess connecting to suspicious domains or IP addresses you don’t recognize, that’s a strong indication of malware impersonating the legitimate process.

What’s the difference between CCXProcess.exe and other Adobe processes?

CCXProcess.exe is specifically the Creative Cloud Experience process focused on background services, content delivery, and synchronization. Other Adobe processes you might see include: Creative Cloud.exe (the main Creative Cloud desktop application interface), Adobe Desktop Service.exe (handles licensing and updates), AdobeIPCBroker.exe (manages inter-process communication between Adobe apps), and CoreSync.exe (manages file synchronization). Additionally, each Adobe application has its own process (Photoshop.exe, Premiere Pro.exe, etc.). All of these are legitimate Adobe processes with specific functions, and each should have minimal resource usage when not actively in use. If you’re concerned about the number of Adobe processes running, you can disable Creative Cloud from launching at startup, which will prevent most background Adobe processes from running automatically.

The post CCXProcess.exe: What It Is, Why It’s Running, and How to Stop It appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/ccxprocess-exe/feed/ 0
AcroTray.exe https://gridinsoft.com/blogs/acrotray-exe/ https://gridinsoft.com/blogs/acrotray-exe/#respond Thu, 13 Jun 2024 05:56:07 +0000 https://gridinsoft.com/blogs/?p=21791 The Acrotray.exe process is one of the important components provided by Adobe Systems. This process is associated with Adobe Acrobat software and often starts automatically when the Windows operating system starts. However, not every user knows what this process is, what it is for and whether it is safe. Let’s do a complete technical analysis […]

The post AcroTray.exe appeared first on Gridinsoft Blog.

]]>
The Acrotray.exe process is one of the important components provided by Adobe Systems. This process is associated with Adobe Acrobat software and often starts automatically when the Windows operating system starts. However, not every user knows what this process is, what it is for and whether it is safe. Let’s do a complete technical analysis of this process, its functionality, and security.

AcroTray.exe – What is it?

AcroTray.exe is an executable file that is part of the Adobe Acrobat software. This process supports PDF-related functions such as document conversion, creation, and editing directly from the desktop without having to open the Adobe Acrobat program itself. In addition, AcroTray.exe helps manage licenses and updates for Adobe products. That function is critical for enterprise users who must have all the latter up-to-date.

AcroTray.exe in system startup
WIndows start-up configuration

The Acrotray.exe process usually starts at system startup and runs in the background, providing quick access to Adobe features. This may include integration with various applications such as Microsoft Office, where Acrotray.exe acts as an intermediate layer that facilitates the export and import of PDF documents. Technically, the process is a safe and important element for users of Adobe products, but its presence constantly in active processes may raise questions about the appropriateness of its use.

Main Functionalities:

  • The ability to convert documents to PDF format from various applications such as Microsoft Office (Word, Excel, and others) without opening Adobe Acrobat.
  • Help with managing the printing of PDF documents. Participates in setting up print options and selecting options right before printing. This improves the quality and accuracy of printed documents.
  • Automated update checks for Adobe Acrobat and other Adobe components.
  • Management for various plug-ins and add-ons for Adobe Acrobat, ensuring that they work properly and interact with the main program.
  • Informer functions, providing notifications of new features, offers, or changes to Adobe services.

Acrotray.exe is Missing – Fixing Guide

The problem with the missing Acrotray.exe file can be a major nuisance for Adobe Acrobat and Adobe Reader users. The absence of this file can cause the program to not work properly, errors during startup or while performing certain functions such as viewing PDF documents or printing them. Here are a few steps you can take to resolve this issue:

Program Recovery can via Control Panel help you recover missing files, including Acrotray.exe.

  1. Close the Adobe Acrobat program and all Acrobat processes from Task Manager.
  2. Then open “Control Panel” → “Programs” → “Programs and Features” → “Uninstall a program” and click “Adobe Acrobat DC”.
  3. Press “Change” and choose “Repair” in the dialog box.
  4. After the program repair is complete, restart your PC.

In case repair did not help, reinstall the program. For this, uninstall the program in the same Control Panel and restart the computer. Install Adobe Acrobat downloaded from the official website.

AcroTray.exe – Is it a Virus?

As I wrote above, AcroTray.exe is a completely legitimate file. Still, like with any other executable file, its name may be taken by a virus or other malware. To make sure that AcroTray.exe is safe, you should check its location. The correct path to the file should be in the folder:

C:\Program Files (x86)\Adobe\Acrobat DC\Acrobat\AcroTray.exe
– for modern versions of Adobe Acrobat

C:\Program Files (x86)\Adobe\Acrobat 11.0\Acrobat\AcroTray.exe
– for older versions of Adobe Acrobat (11 and under)

Another way to understand whether the Acrotray process is legit is checking the location and digital signature of the file.

To authenticate AcroTray.exe, you can use Task Manager:

  • To do this, press the key combination: Ctrl+Shift+Esc

Opening Task Manager

  • In the list of processes, find the process with the name AcroTray.exe. Right-click on the process of interest in the list. Select “Open file location“. This action will automatically open the folder where the process executable is located.

AcroTray.exe location

  • Right-click on the AcroTray.exe file and select “Properties“.

AcroTray.exe Properties

  • Click the “Details” tab and check the file information such as description, file size and digital signature. Legitimate Adobe files are usually digitally signed by Adobe Systems Incorporated.

Details

Attackers may use the name AcroTray to disguise their malware – a common trick for backdoors and coin miner malware. If you find the AcroTray.exe file in an unusual location, such as AppData\Roaming or AppData\Temp folder, or its behavior is suspicious (such as excessive use of system resources), it may be a sign of infection.

Scan your system for viruses

On the other hand, if you want to completely uninstall AcroTray.exe, you can uninstall the entire Adobe Acrobat package if you don’t need it. To do this, open “Control Panel” → “Programs and Features“, find Adobe Acrobat and select “Uninstall“.

Nevertheless, to make sure that AcroTray.exe file is safe, it is recommended to perform an antivirus scan. One reliable tool for this purpose is Gridinsoft Anti-Malware. This antivirus specializes in detecting and eliminating various types of malware, including those that can hide under the guise of legitimate system files.

GridinSoft Anti-Malware main screen

Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.

After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click "Advanced mode" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.

Scan results screen

Click "Clean Now" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.

Removal finished

The post AcroTray.exe appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/acrotray-exe/feed/ 0
Two Adobe ColdFusion Vulnerabilities Exploited in The Wild https://gridinsoft.com/blogs/two-coldfusion-vulnerabilities-exploited/ https://gridinsoft.com/blogs/two-coldfusion-vulnerabilities-exploited/#respond Tue, 09 Jan 2024 15:56:38 +0000 https://gridinsoft.com/blogs/?p=18889 Two vulnerabilities in Adobe ColdFusion are exploited in real-world attacks, the Cybersecurity & Infrastructure Security Agency (CISA) warns. Both issues are related to the possibility of arbitrary code execution, caused by poor validation of deserialized data. Adobe released patches for both of these vulnerabilities back in mid-July 2023, when they were originally detected. ColdFusion ACE […]

The post Two Adobe ColdFusion Vulnerabilities Exploited in The Wild appeared first on Gridinsoft Blog.

]]>
Two vulnerabilities in Adobe ColdFusion are exploited in real-world attacks, the Cybersecurity & Infrastructure Security Agency (CISA) warns. Both issues are related to the possibility of arbitrary code execution, caused by poor validation of deserialized data. Adobe released patches for both of these vulnerabilities back in mid-July 2023, when they were originally detected.

ColdFusion ACE Vulnerabilities Exploited in Real-World Attacks

On January 8, CISA released their regular notice on new exploited vulnerabilities, specifying among others 2 security breaches in Adobe ColdFusion. Both of them are dated summer 2023, with the patches being available at around the same time. Nonetheless, the organization states about the exploitation, which is not doubtful considering the trends. And as both vulnerabilities score the CVSS rating of 9.8, the very fact of its usage in cyberattacks is concerning.

As I said in the introduction, both CVE-2023-29300 and CVE-2023-38203 are about the poor data validation upon deserialization that leads to the arbitrary code execution (ACE). Interestingly enough, both of them touch the same string versions of ColdFusion – 2018, 2021 and 2023. By sending a specifically crafted data package, targeted on the vulnerable ColdFusion server, adversaries can make the server execute the code they need. No user interaction is needed for this trick, which increases the severity of the vulnerability even more.

Arbitrary code execution vulnerabilities may serve as both initial access points and opportunities for lateral movement. The fact that this particular vulnerability works as is, without the need for user input, makes the exploitation just a piece of cake. And since ColdFusion is a rather popular app server solution, it is not hard to reach something important after compromising it, not to mention how easy it is to find a victim.

List of Affected ColdFusion Versions

Vulnearbility Affected ColdFusion versions
CVE-2023-29300
CVE-2023-38203
ColdFusion 2018, 2021, 2023

Adobe ColdFusion Vulnerability Patches & Mitigation

Upon uncovering the vulnerabilities back in June 2023, Adobe released the updates1 2 which have these issues fixed. The company insisted on users to install these patches as soon as possible. And well, it cannot be a better moment to update than right now, after the official notification regarding the exploitation. Here is the list of ColdFusion versions that are no longer vulnerable to the said exploits:

Version Fixed in
ColdFusion 2023 Update 1
ColdFusion 2021 Update 7
ColdFusion 2018 Update 17

At the same time, no workarounds or mitigations are available. This was expected though, as the nature of these vulnerabilities does not suppose the ability to fix it without the intrusion into the program code. In fact, there was over half a year of time to update, so applying any makeshift fixes now is irrational in any case.

Still, there is the ability to preventively protect the network from any kind of intrusion. By using Network Detection and Response (NDR) solutions, you make it much less likely that illicit traffic will reach your servers. By combining this with all-encompassing protective solutions, like Extended Detection and Response (XDR), you will receive a reliable shield against known threats, as well as ones that are only to be discovered.

Two Adobe ColdFusion Vulnerabilities Exploited in The Wild

The post Two Adobe ColdFusion Vulnerabilities Exploited in The Wild appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/two-coldfusion-vulnerabilities-exploited/feed/ 0
Federal Agency Hacked With ColdFusion Vulnerability https://gridinsoft.com/blogs/federal-agency-hacked-with-coldfusion/ https://gridinsoft.com/blogs/federal-agency-hacked-with-coldfusion/#respond Fri, 08 Dec 2023 10:11:54 +0000 https://gridinsoft.com/blogs/?p=18225 A vulnerability in Adobe’s ColdFusion allowed hackers to breach two public-facing servers at a federal agency. The Cybersecurity and Infrastructure Security Agency (CISA) published a report explaining the way it happened. ColdFusion Vulnerability Exploited to Infiltrate Federal Agency Servers Recently, CISA has reported that Adobe’s ColdFusion – an application development tool, continues to pose a […]

The post Federal Agency Hacked With ColdFusion Vulnerability appeared first on Gridinsoft Blog.

]]>
A vulnerability in Adobe’s ColdFusion allowed hackers to breach two public-facing servers at a federal agency. The Cybersecurity and Infrastructure Security Agency (CISA) published a report explaining the way it happened.

ColdFusion Vulnerability Exploited to Infiltrate Federal Agency Servers

Recently, CISA has reported that Adobe’s ColdFusion – an application development tool, continues to pose a serious threat to organizations. Even though Adobe patched the CVE-2023-26360 vulnerability in March, CISA disclosed that two public-facing web servers at an undisclosed federal government agency were breached this summer.

The attackers exploited the CVE-2023-26360 vulnerability in the ColdFusion software, which enabled them to penetrate the systems. They deploy malware, including a remote access trojan (RAT), and access data through a web shell interface. The problem is that the affected servers ran outdated and vulnerable ColdFusion versions. Although Adobe released patches in March, only some users installed them. As a result, the lack of updates left an opening for intruders to gain initial access.

The Cybersecurity and Infrastructure Security Agency Report screenshot
CISA report on the ColdFusion exploitation

Fixed But Still Works

The CVE-2023-26360 flaw in ColdFusion allows arbitrary code execution without user action. Adobe released the patch that fixes the issue back in March 2023. However, as some users do not see the need to install this hotfix, threat actors have persistently exploited the vulnerability in unpatched systems. The flaw affects ColdFusion versions 2018 Update 15 and earlier, as well as 2021 Update five and earlier, including unsupported versions.

As for current incidents, they both occurred in June. In the first breach, hackers accessed the web server through a vulnerable IP address, exploiting the ColdFusion flaw. They attempted lateral movement, viewed information about user accounts, and executed reconnaissance. In addition, they dropped malicious artifacts, including a RAT that utilizes a JavaScript loader. Nevertheless, the attack was thwarted before successful data exfiltration.

In the second incident, the attackers checked the web server’s operating system and ColdFusion version, inserting malicious code to extract usernames, passwords, and data source URLs. Evidence suggests the activity amounted to network reconnaissance mapping rather than confirmed data theft. The malicious code hints at threat actors’ potential activities, leveraging the compromised credentials.

Nice try, but please try again later

According to experts, although the attackers managed to penetrate the target network, they could not do much damage. Actions encompassed reconnaissance, user account reviews, malware distribution, data exfiltration attempts, and code planting to extract credentials. Eight artifacts were left behind alongside a modified publicly available web shell for remote access.

While later quarantined, assets exposed included password information that could enable deeper network pivoting. However, no data thefts or system transitions were confirmed. It’s unclear whether one or multiple actors were responsible for the linked events. However, one thing is sure: despite vendors fixing vulnerabilities quickly, user’s negligence abuses malicious code without target interaction by even low-skilled actors.

Older Vulnerabilities Cause More and More Concerns

Aside from some extreme cases, software developers rarely ignore patching serious vulnerabilities. Large companies though are ones who definitely pay less attention than they should. And as we can see from this story, this is applicable even to government organizations. And this is what creates concerns.

As time goes on, hackers find more and more ways to exploit the same vulnerabilities. While some of them are getting patched by all parties or rendered ineffective, others remain actual and, what is worse, exploitable. After the initial discovery of a certain vulnerability, it is obvious to expect a boom in its exploitation. This comes especially true for programs that are generally used by large corporations – a category most of govt orgs fall into.

Leaving such vulnerabilities unpatched is effectively an invitation for a hacker to pay your network a visit. In a modern turbulent and uneven time, such decisions borderline recklessness, if not outright sabotage.

The post Federal Agency Hacked With ColdFusion Vulnerability appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/federal-agency-hacked-with-coldfusion/feed/ 0
Citrix and Adobe Vulnerabilities Under Active Exploitation https://gridinsoft.com/blogs/citrix-adobe-vulnerabilities/ https://gridinsoft.com/blogs/citrix-adobe-vulnerabilities/#respond Thu, 20 Jul 2023 16:36:50 +0000 https://gridinsoft.com/blogs/?p=16140 Citrix was able to patch a zero-day vulnerability, while Adobe warns of attacks using ColdFusion Zero-Day and releases an urgent update that nearly fixes the issue. Nonetheless, the story is still not over, as these vulnerabilities are still exploited. Citrix and Adobe Patch 0-day Vulnerabilities Simultaneously, products of two companies were hit with critical vulnerabilities […]

The post Citrix and Adobe Vulnerabilities Under Active Exploitation appeared first on Gridinsoft Blog.

]]>
Citrix was able to patch a zero-day vulnerability, while Adobe warns of attacks using ColdFusion Zero-Day and releases an urgent update that nearly fixes the issue. Nonetheless, the story is still not over, as these vulnerabilities are still exploited.

Citrix and Adobe Patch 0-day Vulnerabilities

Simultaneously, products of two companies were hit with critical vulnerabilities that allowed crooks the remote execution of malicious code. Citrix and Adobe are well known in the software market, so there’s no need to introduce them. The vulnerability in Citrix NetScaler has a CVSS of 9.8 out of 10, allowing for code execution without authentication. On July 18, Citrix said it had patched the vulnerabilities. However, attackers have likely had time to exploit them.

Adobe is doing a little worse in this regard. Adobe ColdFusion, a popular server-side scripting language, faces critical vulnerabilities. These vulnerabilities are noted as CVE-2023-38203 with a severity level of 9.8 out of 10 and CVE-2023-29298. This allows an unauthenticated attacker to execute arbitrary code on a vulnerable server. The company soon released a patch that was supposed to fix the vulnerabilities. However, the patch provided by Adobe for CVE-2023-29298 on July 11 is incomplete, which means that remedies against CVE-2023-29298 do not currently exist.

Moreover, experts discovered that the vulnerability that Adobe patched a few days earlier was actually CVE-2023-38203 and not CVE-2023-29300. The security company made a mistake by unintentionally releasing a critical zero-day vulnerability to users already dealing with the threat posed by the incomplete patch. Project Discovery quickly took down the disclosure post, and Adobe fixed the vulnerability two days later. By the way, the CVE-2023-29300 vulnerability also has a severity rating of 9.8.

Consequences

While estimating the potential damage from these vulnerabilities is impossible, it can be compared to the MOVEit and GoAnywhere vulnerabilities. The former resulted in 357 individual organizations being compromised, while the latter affected over 100 organizations. However, both organizations have since released patches. Meaning users can only hope the problem will be fixed soon.

Top 10 countries that use ColdFusion
The countries that use Adobe ColdFusion

How to protect against vulnerabilities?

Protecting against vulnerabilities involves adopting proactive cybersecurity measures and practices. Here are some steps you can take to enhance your security:

  • Keep Software Updated. You should regularly update your operating system, applications, and antivirus software. Developers release updates to patch security vulnerabilities, so staying up-to-date is crucial.
  • Use Strong Passwords. Strong passwords will help prevent compromise through brute force. In addition, consider using a password manager to store and manage your passwords securely.
  • Enable Multi-Factor Authentication. Adding MFA (multi-factor authentication) provides an additional layer of security by requiring extra verification (like a code sent to your phone). It will be a different and insurmountable barrier to intruders.
  • Use protection solutions. Powerful antivirus software is integral to complementing the above recommendations. In the event of an attempt to infect the system, it will neutralize the threat before it can cause harm.
  • Keep Abreast of Security News. Finally, stay informed about the latest cybersecurity threats and best practices to adapt your defenses accordingly.

Although there is no such thing as 100% protection, implementing these measures can significantly reduce your risk and make it harder for attackers to exploit vulnerabilities.

The post Citrix and Adobe Vulnerabilities Under Active Exploitation appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/citrix-adobe-vulnerabilities/feed/ 0
Flash content will be blocked from January 12, 2021 https://gridinsoft.com/blogs/flash-content-will-be-blocked-from-january-12-2021/ https://gridinsoft.com/blogs/flash-content-will-be-blocked-from-january-12-2021/#respond Thu, 10 Dec 2020 21:16:13 +0000 https://blog.gridinsoft.com/?p=4842 Adobe released the latest Flash update this week and is even more persists in recommendations that users uninstall the app before end of support at the end of this year. Flash content will be blocked a little later. Let me remind you that earlier the developers have already warned that they will ask users to […]

The post Flash content will be blocked from January 12, 2021 appeared first on Gridinsoft Blog.

]]>
Adobe released the latest Flash update this week and is even more persists in recommendations that users uninstall the app before end of support at the end of this year. Flash content will be blocked a little later.
In the latest Flash Player update, we updated the language and functionality of the hints for reinstallation of application to encourage people to uninstall Flash Player before end of service and to help users know that starting January 12, 2021, Adobe will block any Flash content from launching. the developers tell.

Let me remind you that earlier the developers have already warned that they will ask users to remove Adobe Flash from their machines by the end of the year.

In the latest update, the actual date of “death” of Flash is decided: January 12, 2021, after which any type of Flash content will not be launched inside the application.

The fact is that even if the user does not bother to uninstall Flash on his own, a few months ago the company added a kind of “time bomb” to the code, which will prevent the application from being used in the future.

It is also worth recalling that in October this year, Microsoft already released an update that removes Adobe Flash from all versions of Windows 10 and Windows Server, and also prevents it from being reinstalled on the device.

The “death” of Flash is expected to have minimal impact on the web ecosystem, as, according to a study by W3Techs, only 2.3% of sites still use Flash, which means that this figure has significantly decreased in recent years (for example, in 2011, the market share Flash was 28.5%).

Along with the release of the latest update, Adobe took the time to thank all Flash users and web developers who have been using it in their everyday lives and work for so many years:

We would like to thank all of our customers and developers who have used and created amazing Flash Player content over the past two decades. We are proud that Flash has played a pivotal role in the development of web content in the areas of animation, interactivity, sound and video.

Let me remind you that OS Windows 7 was also hard and reluctant to leave us: Microsoft released farewell updates for Windows 7 in january 2020, but My Digital Life forum community has found an illegal way to extend support for Windows 7.

The post Flash content will be blocked from January 12, 2021 appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/flash-content-will-be-blocked-from-january-12-2021/feed/ 0
On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities https://gridinsoft.com/blogs/on-july-patch-tuesday-microsoft-fixed-only-123-vulnerabilities/ https://gridinsoft.com/blogs/on-july-patch-tuesday-microsoft-fixed-only-123-vulnerabilities/#respond Wed, 15 Jul 2020 16:46:09 +0000 https://blog.gridinsoft.com/?p=4050 As part of the July update Tuesday, Microsoft engineers fixed 123 vulnerabilities in 13 different products. Any of them was under attack. In July did not reach the record of June Tuesday only a little, when were fixed129 vulnerabilities. The most serious vulnerability fixed this time is the CVE-2020-1350 problem, also known as SigRed, found […]

The post On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities appeared first on Gridinsoft Blog.

]]>
As part of the July update Tuesday, Microsoft engineers fixed 123 vulnerabilities in 13 different products. Any of them was under attack.

In July did not reach the record of June Tuesday only a little, when were fixed129 vulnerabilities.

The most serious vulnerability fixed this time is the CVE-2020-1350 problem, also known as SigRed, found as part of the Windows DNS Server. The vulnerability was discovered by Check Point specialists and scored 10 points out of 10 on the CVSSv3 vulnerability rating scale.

Other major issues this month included vulnerabilities that could allow remote code execution that were discovered as part of:

  • RemoteFX vGPU component in the Microsoft Hyper-V hypervisor (CVE-2020-1041, CVE-2020-1040, CVE-2020-1032, CVE-2020-1036, CVE-2020-1042, CVE-2020-1043);
  • Jet Database Engine, included in some Office applications (CVE-2020-1400, CVE-2020-1401, CVE-2020-1407);
  • Microsoft Word (CVE-2020-1446, CVE-2020-1447, CVE-2020-1448);
  • Microsoft Excel (CVE-2020-1240);
  • Microsoft Outlook (CVE-2020-1349);
  • Microsoft Sharepoint (CVE-2020-1444);
  • Windows LNK shortcut files (CVE-2020-1421);
  • various Windows graphics components (CVE-2020-1435, CVE-2020-1408, CVE-2020-1412, CVE-2020-1409, CVE-2020-1436, CVE-2020-1355).

Adobe, in turn, has fixed more than a dozen vulnerabilities in products such as Creative Cloud, Media Encoder, Genuine Service, ColdFusion, and Download Manager.

So, in the Windows version of Download Manager, Adobe fixed a critical error that allowed the introduction of commands, which could lead to the execution of arbitrary code.

“In Media Encoder for Windows and macOS, were resolved two critical out-of-bounds writing issues that could also lead to arbitrary code execution, as well as an out-of-bounds reading error that entailed information disclosure”, – report Adobe experts.

A critical vulnerability has also been fixed in the desktop version of Creative Cloud. The problem is with symbolic links, which can allow an attacker to write arbitrary files to the target system. Three other vulnerabilities detected in the application are marked as important and allow increasing privileges in the system.

As part of the Genuine Service, have been fixed two bugs that allow privilege escalation, as well as in ColdFusion.

SAP experts advise their users not to forget that in addition to the recently discovered and extremely dangerous RECON vulnerability for SAP, have been released several other important fixes.

Recent patches include disclosure in NetWeaver (CVE-2020-6285) and several not-so-dangerous errors in Disclosure Management (CVE-2020-6267), Business Objects (CVE-2020-6281, CVE-2020-6276), NetWeaver AS JAVA (CVE-2020-6282) and Business Objects BI (CVE-2020-6278, CVE-2020-6222).

Also this month were released patches for the products of other vendors, including several updates from VMware, fixing about a hundred errors from Oracle (the highest CVSS score is 8.8 points for CVE-2016-1000031 vulnerability), and also updated Chrome, where One critical error and seven high-severity flaws were corrected.

The post On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/on-july-patch-tuesday-microsoft-fixed-only-123-vulnerabilities/feed/ 0