The Adobe Product Security Incident Response Team updated security bulletins for Adobe Flash Player in a blog post today, with one vulnerability patched in Flash Player. Adobe assigned an Important severity rating to the vulnerability. The vulnerability impacts Windows, Mac, Linux and ChromeOS operating systems running Flash Player 126.96.36.199 (Windows, Mac) and earlier. Refer to the Affected Product Versions chart for specific product and version information for each platform. The Important rating means “a vulnerability, which, if exploited would compromise data security, potentially allowing access to confidential data, or could compromise processing resources in a user’s computer.”
Adobe assigned the Flash Player vulnerability a Priority 2 rating, except for Linux (Priority 3). Vulnerabilities categorized as Priority 2 are at an elevated risk of being targeted with no known exploits. Adobe recommends applying the update that resolves the vulnerability as soon as possible by updating to Flash Player 188.8.131.52. Refer to the Solution chart for the specific updated version for each platform.
Certain web browsers, such as Google Chrome and Microsoft Edge, already have Flash Player built-in. As such, Chrome will automatically update itself when new versions of Flash Player are available. Nonetheless, it is always a good practice to check for updates yourself. You are responsible for keeping yourself safe while online.
It has been one month since Adobe last released security updates for Flash Player. On December 12, 2017, Adobe released an update that patched 1 moderate vulnerability in Flash Player.
References for January 9, 2018, Adobe Flash Player Important Update
Adobe Security Bulletin: Security updates available for Adobe Flash Player
Adobe PSIRT Blog Post: Security Bulletins posted
Thank you for visiting Tech Help Knowledgebase to learn about the one vulnerability patched in Flash Player January 2018 update. If you liked this article, follow us on Twitter @techhelpkb and subscribe to our YouTube channel to keep in the loop.
Image Credit: Pixabay / Angela_Yuriko_Smith