Last updated: March 13, 2018
The Adobe Product Security Incident Response Team updated security bulletins for Adobe Flash Player in a blog post today, with two vulnerabilities patched in Flash Player. Adobe assigned a Critical severity rating to the vulnerabilities. The vulnerabilities impact Windows, Mac, Linux and ChromeOS operating systems running Flash Player 18.104.22.168 (Windows, Mac) and earlier. Refer to the Affected Product Versions chart for specific product and version information for each platform. The Critical rating means “a vulnerability, which, if exploited would allow malicious native-code to execute, potentially without a user being aware.”
Adobe assigned the Flash Player vulnerabilities a Priority 1 rating, except for Linux (Priority 3). Vulnerabilities categorized as Priority 1 are being targeted, or which have a higher risk of being targeted, by exploit(s) in the wild for a given product version and platform. Adobe recommends applying the update that resolves the vulnerability as soon as possible by updating to Flash Player 22.214.171.124. Refer to the Solution chart for the specific updated version for each platform.
Certain web browsers, such as Google Chrome and Microsoft Edge, already have Flash Player built-in. As such, Chrome will automatically update itself when new versions of Flash Player are available. Nonetheless, it is always a good practice to check for updates yourself. You are responsible for keeping yourself safe while online.
It has been one month since Adobe last released security updates for Flash Player. On January 9, 2018, Adobe released an update that patched 1 important vulnerability in Flash Player.
References for February 6, 2018, Adobe Flash Player Critical Update
Adobe Security Bulletin: Security updates available for Adobe Flash Player
Adobe PSIRT Blog Post: Security Bulletins posted
Thank you for visiting Tech Help Knowledgebase to learn about the two vulnerabilities patched in Flash Player February 2018 update. If you liked this article, follow us on Twitter @techhelpkb and subscribe to our YouTube channel to keep in the loop.
Image Credit: Pixabay / jplenio