Changeflow GovPing Data Privacy & Cybersecurity Adobe Connect Multiple Critical Vulnerabilities...
Priority review Guidance Added Final

Adobe Connect Multiple Critical Vulnerabilities Allowing Arbitrary Code Execution, CVSS 9.6

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund issued a security advisory warning of multiple critical vulnerabilities in Adobe Connect (CVSS Base Score 9.6). Affected versions include Adobe Connect below version 12.11 and Adobe Connect Desktop Application below version 2025.9. Remote anonymous attackers can exploit these flaws to execute arbitrary code or conduct cross-site scripting attacks.

What changed

CERT-Bund published a critical security advisory for Adobe Connect identifying multiple vulnerabilities with a CVSS Base Score of 9.6. The affected products are Adobe Connect versions prior to 12.11 and Adobe Connect Desktop Application versions prior to 2025.9. A remote, anonymous attacker can exploit these vulnerabilities to execute arbitrary code or perform cross-site scripting attacks.

Organizations using Adobe Connect must immediately update to the patched versions (12.11 for the main platform and 2025.9 for the desktop application) to mitigate the risk of remote code execution attacks. Given the critical CVSS score and the availability of exploits, this vulnerability poses significant risk to any organization running affected versions of Adobe Connect.

What to do next

  1. Apply security update to Adobe Connect version 12.11 or higher
  2. Update Adobe Connect Desktop Application to version 2025.9 or higher

Archived snapshot

Apr 16, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-1109] Adobe Connect: Mehrere Schwachstellen CVSS Base Score 9.6 (kritisch) CVSS Temporal Score 8.3 (hoch) Remoteangriff ja Datum 14.04.2026 Stand 15.04.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • MacOS X
  • Windows

Produktbeschreibung

Adobe Connect ist eine Software zur Erstellung von Informationen, Präsentationen, Online-Schulungsunterlagen, Webkonferenzen, Lernmodulen und für Benutzer-Desktop-Sharing.

Produkte

14.04.2026
- Adobe Connect <12.11

  • Adobe Connect Desktop Application <2025.9

Angriff

Angriff

Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Adobe Connect ausnutzen, um beliebigen Programmcode auszuführen oder Cross-Site-Scripting-Angriffe durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
April 14th, 2026
Instrument
Guidance
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-1109

Who this affects

Applies to
Technology companies Organizations using Adobe Connect
Industry sector
5112 Software & Technology
Activity scope
Software patching Vulnerability remediation Remote code execution prevention
Threshold
Adobe Connect <12.11; Adobe Connect Desktop Application <2025.9
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Software & Technology Data Privacy

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!