{"id":45361,"date":"2026-04-14T00:25:28","date_gmt":"2026-04-13T16:25:28","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/14\/adobe-rolls-out-emergency-fix-for-acrobat-reader-zero-day-flaw\/"},"modified":"2026-04-14T00:25:28","modified_gmt":"2026-04-13T16:25:28","slug":"adobe-rolls-out-emergency-fix-for-acrobat-reader-zero-day-flaw","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/14\/adobe-rolls-out-emergency-fix-for-acrobat-reader-zero-day-flaw\/","title":{"rendered":"Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/04\/13\/Adobe.jpg\" width=\"1600\" alt=\"Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw\"><\/p>\n<p>Adobe has released an emergency security update for Acrobat Reader to fix a vulnerability, tracked as&nbsp;CVE-2026-34621, that&nbsp;has been exploited in zero-day attacks since at least December.<\/p>\n<p>The flaw allows malicious&nbsp;PDF files to bypass sandbox restrictions and invoke privileged JavaScript APIs, potentially leading to arbitrary code execution.&nbsp;The <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december\/\" target=\"_blank\" rel=\"nofollow noopener\">exploit observed in attacks<\/a> enables reading and stealing arbitrary files.&nbsp;No user interaction is required beyond opening the malicious PDF.<\/p>\n<p>Specifically, the exploit abuses APIs like util.readFileIntoStream() to read arbitrary local files and RSS.addFeed() to exfiltrate data and fetch additional attacker-controlled code.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw\"><\/a> <\/div>\n<p>The security issue was discovered by Haifei Li, founder of the EXPMON&nbsp;exploit detection system,&nbsp;after someone submitted for analysis a <a href=\"https:\/\/pub.expmon.com\/analysis\/328131\/\" target=\"_blank\" rel=\"nofollow noopener\">PDF sample<\/a> named &#8220;<em>yummy_adobe_exploit_uwu.pdf<\/em>.&#8221;<\/p>\n<p>Haifei Li says that someone submitted the sample to EXPMON on March 26, but it had been sent to VirusTotal three days before, where only five out of 64 security vendors <a href=\"https:\/\/www.virustotal.com\/gui\/file\/65dca34b04416f9a113f09718cbe51e11fd58e7287b7863e37f393ed4d25dde7\" target=\"_blank\" rel=\"nofollow noopener\">flagged it as malicious<\/a> at the time.<\/p>\n<p>The researcher decided to manually investigate the issue after the exploit detection system activated its &#8220;detection in depth&#8221; feature, an&nbsp;advanced detection capability Haifei Li specifically developed for Adobe Reader, he says in a <a href=\"https:\/\/justhaifei1.blogspot.com\/\" target=\"_blank\" rel=\"nofollow noopener\">blog post<\/a> last week.<\/p>\n<p>Security researcher Gi7w0rm <a href=\"https:\/\/x.com\/Gi7w0rm\/status\/2042003381158379554\" target=\"_blank\" rel=\"nofollow noopener\">spotted attacks<\/a> in the wild that leveraged Russian-language documents with oil and gas industry lures.<\/p>\n<p>Following the receipt of Li&rsquo;s report, Adobe published a <a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb26-43.html\" target=\"_blank\" rel=\"nofollow noopener\">security bulletin<\/a> over the weekend, assigning the vulnerability the CVE-2026-34621 tracker.<\/p>\n<p>Although the flaw was initially rated critical (9.6) with a network attack vector, Adobe subsequently lowered the severity to 8.6 after changing the vector to local.<\/p>\n<p>The vendor listed the following Windows and macOS products as impacted:<\/p>\n<ul>\n<li>Acrobat DC versions 26.001.21367 and earlier (fixed in version 26.001.21411)<\/li>\n<li>Acrobat Reader DC versions 26.001.21367 and earlier (fixed in version 26.001.21411)<\/li>\n<li>Acrobat 2024 versions 24.001.30356 and earlier (fixed in version 24.001.30362 on Windows, and version 24.001.30360 on Mac)<\/li>\n<\/ul>\n<p>Adobe recommends that users of the above software update their applications through &lsquo;Help &gt; Check for Updates,&rsquo; which triggers an automated update.<\/p>\n<p>Alternatively, users may download an Acrobat Reader installer from Adobe&rsquo;s <a href=\"https:\/\/nam04.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fget.adobe.com%2Freader&amp;data=05%7C02%7Cswatson%40adobe.com%7C675bbcff341a4acc045d08dd19d0ba7b%7Cfa7b1b5a7b34438794aed2c178decee1%7C0%7C0%7C638695106463324612%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=xm%2B0ml%2Bsuc%2Fi8pF7Rqy%2BBFuS5u2NYBCchqSGB3DKDDU%3D&amp;reserved=0\" target=\"_blank\" rel=\"nofollow noopener\">official software portal<\/a>.<\/p>\n<p>No workarounds or mitigations were listed in the bulletin, so applying the security updates is the only recommended action.<\/p>\n<p>However, users should always be wary of PDF files sent from unsolicited sources and open them in sandboxed environments when suspicious.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation\/\">Critical Marimo pre-auth RCE flaw now under active exploitation<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks\/\">Max severity Flowise RCE vulnerability now exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks\/\">Critical Fortinet Forticlient EMS flaw now exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows\/\">CISA: New Langflow flaw actively exploited to hijack AI workflows<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/polyshell-attacks-target-56-percent-of-all-vulnerable-magento-stores\/\">PolyShell attacks target 56% of all vulnerable Magento stores<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Adobe has released an emergency security update for Acr [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45361","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45361"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45361\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}