CISA: Maximum-severity Adobe flaw now exploited in attacks
Adobe Experience Manager Forms on JEE 存在最高级别安全漏洞 CVE-2025-54253,允许攻击者绕过认证并远程执行代码。该漏洞由 Searchlight Cyber 研究人员发现并报告后,Adobe 于 8 月 9 日发布补丁修复。CISA 已将此漏洞加入已知被利用漏洞目录,并要求联邦机构在 11 月 5 日前完成修复以应对恶意网络攻击风险。 2025-10-16 14:30:20 Author: www.bleepingcomputer.com(查看原文) 阅读量:11 收藏

Adobe

CISA has warned that attackers are actively exploiting a maximum-severity vulnerability in Adobe Experience Manager to execute code on unpatched systems.

Tracked as CVE-2025-54253, this critical security flaw stems from a misconfiguration weakness that affects Adobe Experience Manager (AEM) Forms on JEE versions 6.5.23 and earlier.

Successful exploitation can allow unauthenticated threat actors to bypass security mechanisms and execute arbitrary code remotely in low-complexity attacks that don't require user interaction.

The flaw was discovered by Adam Kues and Shubham Shah of Searchlight Cyber, who disclosed it to Adobe on April 28th, together with two other issues (CVE-2025-54254 and CVE-2025-49533).

However, Adobe patched only the latter in April, leaving the other two unfixed for over 90 days, until after the two security researchers published a write-up on July 29th detailing how the vulnerabilities work and how they can be exploited.

Adobe finally released security updates on August 9th to address the CVE-2025-54253 vulnerability, confirming that proof-of-concept exploit code was already publicly available.

As Searchlight Cyber explained, CVE-2025-54253 is an authentication bypass that leads to remote code execution (RCE) via Struts DevMode. The researchers also advised admins to restrict Internet access to AEM Forms when deployed as a standalone application if they can't immediately patch the software.

CISA has now added this vulnerability to its Known Exploited Vulnerabilities Catalog, giving Federal Civilian Executive Branch (FCEB) agencies three weeks to secure their systems by November 5th, as mandated by the Binding Operational Directive (BOD) 22-01 issued in November 2021.

Although BOD 22-01 targets U.S. federal agencies, the cybersecurity agency encouraged all organizations, including those in the private sector, to prioritize patching their systems against this actively exploited flaw as soon as possible.

"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable," CISA warned on Wednesday.

"These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise," it added.

Picus BAS Summit

The Security Validation Event of the Year: The Picus BAS Summit

Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation.

Don't miss the event that will shape the future of your security strategy


文章来源: https://www.bleepingcomputer.com/news/security/cisa-maximum-severity-adobe-flaw-now-exploited-in-attacks/
如有侵权请联系:admin#unsafe.sh