Lucian Constantin
CSO Senior Writer

Flash Player emergency patch fixes one flaw already being exploited, and two others

news
Oct 19, 20151 min

One of the vulnerabilities is already being used in cyber espionage attacks against government targets

Adobe released a patch for a critical vulnerability in Flash Player faster than it originally anticipated in response to high-profile cyberespionage attacks against governmental targets.

The latest Flash Player updates released Friday address a flaw that’s already exploited by a Russian espionage group known as Pawn Storm, as well as two other critical vulnerabilities reported privately to Adobe.

The CVE-2015-7645 vulnerability is actively exploited by the Pawn Storm group in attacks targeting several foreign affairs ministries from around the globe, security researchers from Trend Micro reported Tuesday.

Adobe confirmed the vulnerability Wednesday and initially scheduled a fix for this week. It then exceeded its own expectations and delivered the patch Friday.

Users of Flash Player on Windows and Mac are strongly advised to upgrade to version 19.0.0.226, and Linux users to version 11.2.202.540. Users of the extended support release should make sure they’re running the latest 18.0.0.255 version.

In addition to fixing CVE-2015-7645, the new updates also address two type confusion vulnerabilities — CVE-2015-7647 and CVE-2015-7648 — reported by Natalie Silvanovich of Google’s Project Zero team.

If left unpatched, all three flaws can allow attackers to execute arbitrary code on affected computers and take control of them.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author