It is no secret that cybersecurity is of utmost importance for any business. Apart from keeping up to date with current cybersecurity measures, one should also stay informed of current issues being faced. One of those issues is the recent Magneto 2 RCE Bug attack.
Here is what we know
The Magento 2 RCE bug is actively attacked, according to Adobe. On Sunday, Adobe released an emergency remedy, and eCommerce websites should update as soon as possible to avoid Magecart card-skimming attacks and other issues.
How are you affected by the Magneto 2 RCE bug?
The security flaw (CVE-2022-24086) is a serious one, as it allows for pre-authentication RCE due to incorrect input validation. On the CVSS vulnerability-severity scale, it receives a 9.8 out of ten, however, there is one mitigating factor: an attacker would need administrator rights to succeed.
Adobe’s Magento platform had a severe security flaw, according to information disclosed in a recent report. Magento is a well-known open-source e-commerce platform that makes running an online store easier. Because of its widespread use, any flaw in the platform has a direct impact on thousands of online stores throughout the world. The Adobe Commerce and Magento Open Source platforms both had a significant code execution flaw, according to the alert. The internet behemoth even admits to actively exploiting the issue that targeted specific online retailers.
For online merchants, upgrading is critical. The Magecart group is well-known for targeting unpatched versions of Magento in particular, looking for a way to install credit-card skimmers on eCommerce checkout pages.
For the time being, Adobe has described the attacks as “very limited.” However, card-skimmer activity is on the rise, and website owners’ updates appear to be scarce.
This is an “emergency remedy” for Adobe Commerce, which comes a week after the company’s Patch Tuesday updates for several products. As a result, users of Adobe Photoshop, Illustrator, After Effects, Adobe Premiere Rush, and Creative Cloud Desktop should check for the latest updates on their systems.