Security Advisory for Flash Player | APSA18-01
Bulletin ID Date Published Priority
APSA18-01 February 1, 2018 1


A critical vulnerability (CVE-2018-4878) exists in Adobe Flash Player and earlier versions. Successful exploitation could potentially allow an attacker to take control of the affected system.

Adobe is aware of a report that an exploit for CVE-2018-4878 exists in the wild, and is being used in limited, targeted attacks against Windows users. These attacks leverage Office documents with embedded malicious Flash content distributed via email.

Adobe will address this vulnerability in a release planned for the week of February 5.

For the latest information, users may monitor the Adobe Product Security Incident Response Team blog.

Affected Product Versions

Product Version Platform
Adobe Flash Player Desktop Runtime and earlier versions Windows, Macintosh
Adobe Flash Player for Google Chrome and earlier versions Windows, Macintosh, Linux and Chrome OS 
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 and earlier versions Windows 10 and 8.1
Adobe Flash Player Desktop Runtime and earlier versions Linux

To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right- click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.


Beginning with Flash Player 27, administrators have the ability to change Flash Player's behavior when running on Internet Explorer on Windows 7 and below by prompting the user before playing SWF content.  For more details, see this administration guide.   

Administrators may also consider implementing Protected View for Office.  Protected View opens a file marked as potentially unsafe in Read-only mode.  

Vulnerability details

Vulnerability Category Vulnerability Impact Severity CVE Number
Use-after-free Remote Code Execution Critical CVE-2018-4878


Adobe would like to thank KrCERT/CC for reporting this issue and for working with Adobe to help protect our customers.