CyberLeveling Logo
Adobe February 2026 Security Updates Explained

Adobe February 2026 Security Updates Explained

What Was Fixed, What Matters Most, and How to Prioritize Patching

On February 10, 2026, Adobe released a coordinated set of security updates covering nine different products across Creative Cloud, Substance 3D, and developer tooling. While Adobe labeled every bulletin as Priority 3, a closer look tells a very different story.

This update cycle includes multiple arbitrary code execution vulnerabilities, many rooted in classic memory safety issues like out-of-bounds access, use-after-free bugs, and improper input validation. These are the kinds of flaws attackers love because they are reliable, powerful, and often triggered by opening or previewing files.

This post breaks down:

  • How many bulletins were released
  • Which products carry the most risk
  • Which CVEs matter most
  • A practical patch priority table you can actually use

At a glance: how big was this update?

  • 9 Adobe security bulletins
  • 44 total CVEs
  • 27 critical vulnerabilities
  • A strong concentration of memory corruption issues
  • No known exploitation in the wild at time of release

Even without active exploitation, the volume and severity alone make this a patch cycle worth paying attention to.

Why “Priority 3” doesn’t tell the full story

Adobe’s priority rating reflects exploitability and context, not just severity. Many of these issues:

  • Require local access
  • Require user interaction (opening a file, loading a project)

That said, local + user interaction still describes a huge portion of real-world attacks, especially in creative environments where users routinely open files from external sources.

In practice, arbitrary code execution is arbitrary code execution, and several of these products process complex, untrusted data by design.

Patch priority table with CVEs

In total, Adobe addressed 44 CVEs in this release. The table below highlights the critical and highest-risk vulnerabilities that drive patch priority.

Adobe February 10, 2026 – Patch Priority Table

PriorityProductBulletinCritical CVEsCVE IDsPrimary Risk
P1 – Patch immediatelyAdobe After EffectsAPSB26-1513CVE-2026-21318, 21320–21330, 21351Arbitrary code execution
P1 – Patch immediatelySubstance 3D StagerAPSB26-205CVE-2026-21341–21345Arbitrary code execution
P1 – Patch immediatelyAdobe BridgeAPSB26-212CVE-2026-21346, 21347Arbitrary code execution
P1 – Patch immediatelyLightroom Classic (Windows)APSB26-061CVE-2026-21349Arbitrary code execution
P1 – Patch immediatelyAdobe DNG SDKAPSB26-232CVE-2026-21352, 21353Arbitrary code execution
P2 – Patch soonSubstance 3D DesignerAPSB26-192CVE-2026-21334, 21335Code execution, memory exposure
P2 – Patch soonAdobe AuditionAPSB26-141CVE-2026-21312Code execution
P2 – Patch soonAdobe InDesignAPSB26-171CVE-2026-21357Code execution
P3 – Patch when convenientSubstance 3D ModelerAPSB26-220CVE-2026-21348Memory exposure

The most critical products, explained

Adobe After Effects (APSB26-15)

This is the clear outlier. With 13 critical CVEs, nearly all leading to arbitrary code execution, After Effects represents the largest and most complex attack surface in this release. The bugs span out-of-bounds access, use-after-free, integer overflow, and type confusion.

If you only patch one thing immediately, make it this.

Substance 3D Stager and Adobe Bridge

Both products handle rich media and assets automatically. Bridge, in particular, parses previews and metadata simply by browsing directories. That lowers the bar for exploitation and makes its two critical CVEs more concerning than the number alone suggests.

Lightroom Classic (Windows)

This bulletin contains a single CVE, but it is a straight out-of-bounds write leading to code execution. Image processing libraries are a classic attack vector, and Lightroom runs on machines that often have access to valuable data.

Adobe DNG SDK

This one is easy to underestimate. It’s not an end-user app, but an SDK embedded into other software and services. Two critical CVEs were reported by Google Project Zero, which is usually a strong signal of exploitability. Any product that bundles this SDK inherits the risk.

Lower-risk does not mean no-risk

Substance 3D Modeler is the least severe bulletin in this cycle, with a single memory exposure issue and no code execution. That makes it a reasonable candidate for deferred patching, but not for ignoring entirely.

Final takeaway

This Adobe release may look routine at first glance, but it’s actually a heavy memory-safety patch cycle, especially for media-heavy applications.

If you want a simple rule:

  • Patch P1 products immediately
  • Patch P2 products in your next maintenance window
  • Patch P3 when convenient