Adobe Patches Actively Exploited Critical Vulnerability in Acrobat Reader
Adobe has released an emergency security update to address CVE-2026-34621, a critical vulnerability in Adobe Acrobat Reader that is already being exploited in real-world attacks. The flaw, rated 8.6 (high severity) on the CVSS scale, allows threat actors to execute arbitrary code on a victim’s system, potentially leading to malware installation, data theft, or persistent system access.
The vulnerability affects multiple versions of Acrobat and Reader on Windows and macOS, including:
- Acrobat DC (≤ 26.001.21367) → Patched in 26.001.21411
- Acrobat Reader DC (≤ 26.001.21367) → Patched in 26.001.21411
- Acrobat 2024 (≤ 24.001.30356) → Patched in newer builds
The flaw stems from a prototype pollution vulnerability, a type of bug that allows attackers to manipulate JavaScript objects within the application. Exploitation occurs via malicious PDF files, which can be distributed through phishing emails, compromised websites, or malicious downloads. Once opened in a vulnerable version of Acrobat Reader, the exploit can execute without user awareness.
Security firm EXPMON first disclosed evidence of zero-day exploitation, suggesting attacks may have begun as early as December 2025. Adobe confirmed the flaw’s severity, noting it enables arbitrary code execution rather than just information disclosure.
Given Acrobat Reader’s widespread use, the vulnerability poses a significant risk, particularly in enterprise environments where PDFs are routinely exchanged. The incident highlights the growing trend of attackers targeting common productivity software such as PDF readers and office suites as entry points for cyberattacks.
Unpatched systems remain at risk, with evidence indicating the flaw was exploited for months before disclosure. Users and organizations are advised to apply the latest updates immediately.
Source: https://www.linkedin.com/pulse/adobe-reader-releases-emergency-patch-zero-day-0abte
Adobe cybersecurity rating report: https://www.rankiteo.com/company/adobe
"id": "ADO1776003821",
"linkid": "adobe",
"type": "Vulnerability",
"date": "4/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Users of vulnerable versions of '
'Acrobat Reader',
'industry': 'Technology',
'location': 'Global',
'name': 'Adobe',
'size': 'Large',
'type': 'Software Company'}],
'attack_vector': 'Malicious PDF files',
'customer_advisories': 'Users and organizations are advised to apply the '
'latest updates immediately.',
'data_breach': {'data_exfiltration': 'Potential data theft'},
'date_detected': '2025-12-01',
'description': 'Adobe has released an emergency security update to address '
'CVE-2026-34621, a critical vulnerability in Adobe Acrobat '
'Reader that is already being exploited in real-world attacks. '
'The flaw allows threat actors to execute arbitrary code on a '
'victim’s system, potentially leading to malware installation, '
'data theft, or persistent system access.',
'impact': {'data_compromised': 'Potential data theft',
'operational_impact': 'Potential malware installation or '
'persistent system access',
'systems_affected': 'Windows and macOS systems running vulnerable '
'versions of Acrobat Reader'},
'investigation_status': 'Ongoing',
'lessons_learned': 'Highlights the growing trend of attackers targeting '
'common productivity software as entry points for '
'cyberattacks.',
'post_incident_analysis': {'corrective_actions': 'Patch management and '
'vulnerability remediation',
'root_causes': 'Prototype pollution vulnerability '
'in Adobe Acrobat Reader'},
'recommendations': 'Apply the latest updates immediately to mitigate risk.',
'references': [{'source': 'EXPMON'}],
'response': {'communication_strategy': 'Advisory to apply updates immediately',
'containment_measures': 'Emergency security update released',
'remediation_measures': 'Patch vulnerable versions to '
'26.001.21411 or newer',
'third_party_assistance': 'EXPMON (Security Firm)'},
'title': 'Adobe Patches Actively Exploited Critical Vulnerability in Acrobat '
'Reader',
'type': 'Zero-day Exploitation',
'vulnerability_exploited': 'CVE-2026-34621 (Prototype pollution '
'vulnerability)'}