Skip to main content
bishop337
Participant
November 16, 2020
Question

Manually upgrade GCClient that installs with Adobe Standard DC 17

  • November 16, 2020
  • 5 replies
  • 3061 views

In a corporate environment with proxy servers. We download the software updates and apply them to the clients directly. However, the latest updates do not appear to update the Adobe Genuine Software Integrity Service.

 

Is there an offline upgrade to that client to fix this vulnerability?

https://helpx.adobe.com/au/security/products/integrity_service/apsb20-42.html#solution

 

Running Adobe Acrobat Standard DC 17.011.30180.

 

I've tried changing both the Adobe Genuine Software Integrity Service and the adobe acrobat update service to an admin user with internet access but that doesn't appear to update the client either.

5 replies

Participant
September 14, 2022

Go to your registry and look for the item bUpdater under two locations:

 

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Acrobat Reader\DC\FeatureLockDown

 

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Policies\Adobe\Acrobat Reader\DC\FeatureLockDown

If it's set to 0, you will see in the AdobeGC log that updates are skipped. Set to 1 in both locations and wait a few hours for the next check.  It should update.

Participant
October 20, 2021

Same here. Looking for a way to patch the service manually. 

Participating Frequently
July 27, 2021

I'm also interested in how to force the software to update.  Adobe support told me i had to uninstall all the Adobe software completely (remove folders, cleanup registries) and then re-install from scratch to get it fixed.  Thats not practical.  Has anyone had any luck with this?

Participant
December 7, 2020

We are having the same issue - as we are unable to update C:\Program Files (x86)\Common Files\Adobe\AdobeGCClient\AGSService.exe without internet, which is not an option in my environment. 

 

Any help is getting this file to it's most recent version via an offline installer would really be a big help - as it's currently an open vulnerability from CVE-2020-9667, CVE-2020-9668 & CVE-2020-9681.

kglad
Community Expert
Community Expert
November 16, 2020

<moved from download&install>