The Zend Framework 1 and 2 email component which is used in Magnto 1 and Magento 2 versions has a new found vulnerability which can compromise your Magento eCommerce store security. The vulnerability can pave the way for remote code execution attacks if Sendmail is used as a mail transport agent.
Follow the suggested steps shown before to find if you have been a victim of such an attack:
The vulnerability with the release of the patch – SUPEE-9652 and also upgrade paths to various Magento editions.
Learn how to fix the threat if you are a:
If you are a Enterprise Edition merchant, you have two options to fix the vulnerability threat.
Option 1: Installing Patch SUPEE-9652
Option 2: Upgrading Magento Edition To Enterprise Edition 1.14.3.2
If you are a Community edition merchant, you have two options to fix the vulnerability threat
Option 1: Installing TheSUPEE-9652 Patch
Option 2: Upgrading To Magento Community Edition 1.9.3.2
If you are a Magento partner, you have two options to fix the security threat.
Option 1: Upgrading To Enterprise Edition 1.14.3.2:
Option 2: Installing the patch SUPEE-9652
It’s advisable to fix the security threat as soon as possible by applying the suggested patch to ensure your eCommerce website is secured and no intruder can gain access to your system.