Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenAI Sued for Sharing ChatGPT Data with Google, Class-Action Privacy
May 14, 2026
Langflow CVE-2026-33017 Exploited to Steal AWS Keys and Deploy
May 14, 2026
Packagist: Urgent Composer Update After GitHub Token Leak
May 14, 2026
Home/Vulnerabilities/Critical Adobe Acrobat Reader Flaws Allow Code Execution
Vulnerabilities

Critical Adobe Acrobat Reader Flaws Allow Code Execution

On April 14, 2026, Adobe released a critical security bulletin addressing multiple vulnerabilities in Adobe Acrobat and Reader for Windows and macOS. According to the official advisory, successful...

Marcus Rodriguez
Marcus Rodriguez
April 15, 2026 2 Min Read
8 0

On April 14, 2026, Adobe released a critical security bulletin addressing multiple vulnerabilities in Adobe Acrobat and Reader for Windows and macOS.

According to the official advisory, successful exploitation of these flaws could allow attackers to execute arbitrary code or read arbitrary files on a targeted system.

While these threats carry high severity ratings, Adobe confirmed that they are not currently aware of any active exploits in the wild.

Arbitrary code execution is particularly dangerous in document readers, as threat actors frequently use phishing emails to trick victims into opening weaponized files.

Once a malicious PDF is opened, an attacker could silently install malware, steal sensitive data, or establish a foothold within a corporate network.

Adobe Acrobat Reader Vulnerabilities

The latest security patch addresses two specific vulnerabilities. Both are categorized as Improperly Controlled Modification of Object Prototype Attributes, commonly known as Prototype Pollution (CWE-1321).

This type of flaw occurs when a script manipulates standard object behavior, allowing attackers to bypass security controls.

The security bulletin highlights the following technical details:

  • CVE-2026-34622: A critical vulnerability with a high CVSS base score of 8.6, allowing arbitrary code execution in the context of the current user, was reported by a security researcher known as YH from Zscaler.
  • CVE-2026-34626: Rated as important with a CVSS base score of 6.3, this flaw could result in arbitrary file system reads and expose sensitive local data, discovered by researcher greenapple.

These security flaws affect multiple tracks of Adobe’s PDF software on both Windows and macOS.

Users running outdated software are at risk of potential compromise if they interact with a maliciously crafted document.

The affected products include:

  • Acrobat DC and Acrobat Reader DC (Continuous Track) versions 26.001.21411 and earlier for both Windows and macOS.
  • Acrobat 2024 (Classic Track) version 24.001.30362 and earlier for Windows.
  • Acrobat 2024 (Classic Track) version 24.001.30360 and earlier for macOS.

Mitigations

Adobe rated these updates as Priority 2, meaning no active exploits are known, but patches should be applied promptly to prevent future attacks.

Adobe strongly recommends updating software installations to the newly patched versions: 26.001.21431 for the Continuous Track and 24.001.30365 for the Classic 2024 Track.

Users and IT administrators can secure their environments using the following methods:

  • Open the Adobe application and manually trigger the patch by navigating to Help and selecting Check for Updates.
  • Rely on automatic updates if enabled, which will patch the software in the background without requiring manual user intervention.
  • Download the latest full installer directly from the official Adobe Acrobat Reader Download Center.
  • Deploy updates across managed enterprise environments using standard administrative tools such as SCCM for Windows or Apple Remote Desktop for macOS.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitMalwarePatchphishingSecurityThreatVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

MuddyWater Hackers Scan Systems, Hit MuddyWater-Style Before

Next Post

New Research: Google, Microsoft, Meta Still Track You Post

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical NGINX Vulnerability Allows Remote Code Execution –
May 14, 2026
Critical MongoDB Flaw Allows Arbitrary Code Execution
May 14, 2026
Gentlemen RaaS Exploits Fortinet & Leverages Cisco
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us