Security Point Break: Cybersecurity News and Analysis with Clarity and Candor
Adobe 3D logo against a red background illustrating a story on Adobe patching a zero day bug

Adobe Patches Acrobat Zero-day Under Attack

A critical vulnerability in Adobe Acrobat and Reader is being actively exploited, allowing attackers to take control of affected systems through malicious documents.

A high-severity zero-day vulnerability in Adobe Acrobat and Reader is under active exploitation, according to CISA, and is prompting an emergency out-of-band patch for widely deployed PDF software. Adobe issued a patch over the weekend, according to an company security bulletin.

The flaw, tracked as CVE-2026-34621, is a memory corruption issue that can allow local code execution. In practical terms, an attacker can trick a user into opening a specially crafted PDF file and gain control of the system—installing malware, stealing data, or moving laterally inside a network.

The vulnerability has been reassigned a high 8.6 CVSS severity score by the National Vulnerability Database. Originally the flaw was rated critical (9.6) with a network attack vector, however Adobe subsequently lowered the severity to 8.6 after changing the vector to local.

“Exploitation of this issue requires user interaction in that a victim must open a malicious file,” according to a description of the bug.

Adobe said the vulnerability impacts Acrobat DC and Acrobat Reader DC version 26.001.21367 and earlier, as well as Acrobat 2024 version 24.001.30356 and earlier. The company patched the issue in version 26.001.21411 for DC and Reader, 24.001.30362 for Windows-based Acrobat 2024, and 24.001.30360 for macOS.

The vulnerability came to light after Haifei Li, founder of the EXPMON exploit detection system, examined a suspicious PDF file submitted for analysis, “yummy_adobe_exploit_uwu.pdf.” He subsequently detailed his findings here.

More Marketplace News

Total
0
Shares

Leave a Reply

Previous Article
Security technologist Bruce Schneier speaks at the RSAC 2023 in San Francisco.

Bruce Schneier Pushes Back on Claude Mythos Cyber Hype

Next Article
AI Logo illustrating N-able Pushes UEM into AI Operations with MCP Server, Assistant

N-able Links ChatGPT, Copilot to Live IT Data

Related Posts

Discover more from Security Point Break

Subscribe now to keep reading and get access to the full archive.

Continue reading