Number: AL16-020
Date: 27 October 2016
Purpose
The purpose of this alert is to bring attention to the active exploitation of a recently disclosed vulnerability in Adobe Flash Player.
Assessment
CCIRC is aware of attacks exploiting a previously unknown critical vulnerability in Adobe Flash Player. The vulnerability exists in: versions 23.0.0.185 and earlier of Adobe Flash Player Desktop Runtime, Adobe Flash Player for Google Chrome, and Adobe Flash Player for Microsoft Edge and Internet Explorer 11; and version 11.2.202.637 of Adobe Flash Player for Linux. Identified as CVE-2016-7855, exploitation of this vulnerability could allow an attacker to take control of the affected system.
Suggested action
Due to the elevated risk presented by this vulnerability, CCIRC recommends that system administrators test and deploy the vendor-released updates to affected applications accordingly. CCIRC recommends that priority is given to this patch.
Organizations should consider installing Microsoft's Experience Mitigation Toolkit (EMET). The Enhanced Mitigation Experience Toolkit helps mitigate the exploitation of vulnerabilities by adding additional protection layers that make them harder to exploit.
References
CCIRC Advisory AV16-174: Security Update for Adobe Flash Player: http://www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/2016/av16-174-en.aspx