Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Add as a preferred source on Google

Adobe Acrobat Zero-Day CVE-2026-34621 Under Active Attack

Adobe confirms CVE-2026-34621 zero-day in Acrobat and Reader is being actively exploited. Windows and macOS users must update it.

Adobe Acrobat Zero-Day CVE-2026-34621

Adobe has confirmed that attackers have been quietly exploiting a critical zero-day vulnerability in Adobe Acrobat and Reader since at least December 2025 — and the attack requires nothing more than a victim opening a PDF file.

The vulnerability, now tracked as CVE-2026-34621, carries a CVSS score of 9.6 out of 10 and enables arbitrary code execution (where an attacker can remotely run malicious commands on the victim's machine) across both Windows and macOS platforms. Adobe addressed the flaw on April 11, 2026, under security bulletin APSB26-43, assigning the patch a priority-1 rating.

Security researcher Haifei Li of EXPMON — the sandbox-based exploit detection platform — was the first to flag the threat, describing it as a "highly sophisticated, fingerprinting-style PDF exploit" targeting a zero-day in Adobe Reader's privileged application programming interfaces. 

The exploit, Li warned, works on the latest version of Adobe Reader without requiring any user interaction beyond opening a PDF. No suspicious link to click. No macro to enable. Just open the file.

Another researcher, posting on X under the name Gi7w0rm, noted that the attack appears to leverage Adobe Reader's JavaScript engine. Notably, the malicious PDF documents observed in the wild contained Russian-language lures referencing the oil and gas industry — suggesting a targeted, potentially nation-state-adjacent campaign rather than opportunistic cybercrime.

This isn't Adobe's first encounter with PDF-based attacks — malicious documents have long been a favoured social engineering tool. But a zero-day that silently executes code the moment a PDF renders is a different category of threat entirely. It essentially turns one of the most universally trusted file formats into a silent weapon.

Adobe has issued a 72-hour update advisory for all affected users.

Affected versions include:

  • Acrobat DC / Acrobat Reader DC — version 26.001.21367 and earlier
  • Acrobat 2024 — version 24.001.30356 and earlier

The fix is version 26.001.21411. Users can update immediately via Help → Check for Updates. Enterprise admins can deploy patches via AIP-GPO, SCUP/SCCM (Windows), Apple Remote Desktop, or SSH (macOS).

If you haven't already, stop reading and update now.

Post a Comment