Adobe has released a security update for the Creative Cloud Desktop Application for Windows and MacOS. This update resolves a vulnerability in the validation of certificates used by Creative Cloud desktop applications (CVE-2018-4991), and an improper input validation vulnerability (CVE-2018-4992) that could lead to privilege escalation.
Product | Affected version | Platform |
---|---|---|
Creative Cloud Desktop Application | 4.4.1.298 and earlier versions |
Windows and MacOS |
To check the version of the Adobe Creative Cloud desktop app:
- Launch the Creative Cloud desktop app and sign in with your Adobe ID.
- Click the gear icon and choose Preferences > General.
Adobe categorizes this update with the following priority rating and recommends users update their installation to the newest version:
Product | Updated version | Platform | Priority rating | Availability |
---|---|---|---|---|
Creative Cloud Desktop Application | Creative Cloud 4.5.0.331 | Windows and MacOS | 2 | Download Center |
Customers who have enabled auto-update will automatically receive the new version. The latest Creative Cloud Desktop App can also be downloaded from the Download Center. For more information, please reference this help Page.
For managed environments, IT administrators can use the Creative Cloud Packager to create deployment packages. Refer to this help page for more information on the Creative Cloud Packager.
Vulnerability Category | Vulnerability Impact | Severity | CVE Numbers |
Improper input validation | Privilege Escalation | Important | CVE-2018-4992 |
Improper certificate validation | Security bypass | Critical | CVE-2018-4991 |
Unquoted Search Path | Privilege Escalation | Important | CVE-2018-4873 |
Note: CVE-2018-4873 was previously resolved in version 4.3.0.256 of the Creative Cloud Desktop application.
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
- Wei Wei (@Danny__Wei) of Tencent's Xuanwu Lab (CVE-2018-4992)
- Ryan Hileman of Talon Voice & Chi Chou (CVE-2018-4991)
- Cyril Vallicari / HTTPCS – Ziwit (CVE-2018-4873)