a
News
Adobe Acrobat and Reader Zero Day Vulnerability

Adobe Acrobat and Reader zero-day under active exploitation
Adobe has released emergency updates to address CVE-2026-34621, an actively exploited prototype pollution vulnerability affecting Adobe Acrobat and Reader.
Successful exploitation requires user interaction, but the risk is still serious because a victim only needs to open a malicious PDF for code to run in the context of the current user.
Overview
CVE: CVE-2026-34621
Severity: High
CVSS: 8.6
Affected products: Acrobat DC, Acrobat Reader DC, Acrobat 2024
Platforms: Windows and macOS
Vendor advisory date: 11 April 2026
Threat status: Actively exploited in the wild
Affected Versions
Acrobat DC continuous version 26.001.21367 and earlier
Fixed in: 26.001.21411
Acrobat Reader DC continuous version 26.001.21367 and earlier
Fixed in: 26.001.21411
Acrobat 2024 for Windows version 24.001.30356 and earlier
Fixed in: 24.001.30362
Acrobat 2024 for macOS version 24.001.30356 and earlier
Fixed in: 24.001.30360
Vulnerability Breakdown
CVE-2026-34621 - Prototype pollution leading to arbitrary code execution
Severity: High
CVSS: 8.6
Description: Adobe has identified an improperly controlled modification of object prototype attributes, also known as prototype pollution, in Acrobat and Reader.
Impact: A malicious PDF may trigger arbitrary code execution in the context of the current user.
Conditions: User interaction is required. The victim must open a malicious file.
Notes: Adobe has confirmed exploitation in the wild. The vulnerability has also been added to CISA's Known Exploited Vulnerabilities catalog.
Mitigation
Apply the latest Adobe security updates immediately.
Prioritise endpoints that regularly open externally sourced PDF files.
Instruct users not to open unexpected or untrusted PDF attachments until patching is confirmed.
Monitor endpoints for suspicious behaviour involving Acrobat or Reader launching unexpected child processes or unusual outbound web requests.
Validate patch deployment across both Windows and macOS estates.
Summary for IT Teams
Products: Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat 2024
Threat Level: High, CVSS 8.6, actively exploited
Action Required: Deploy the latest patched versions as a priority, warn users about untrusted PDF attachments, and monitor for suspicious post-open activity on affected endpoints.
Reference
Need Help?
If your organisation needs help assessing exposure, validating patch coverage, or monitoring for related activity, contact Secure ISS on 1300 769 460.

