Home » Technology » Adobe warns: Critical vulnerability in Acrobat

Adobe warns: Critical vulnerability in Acrobat

A critical security vulnerability threatens users of Adobe Acrobat on Windows and MacOS. Attackers are already actively exploiting the vulnerability to spread malware. However, an update is already available and protects against the far-reaching consequences.

Critical vulnerability threatens PDF users

PDF programs such as UPDF or Acrobat Reader are widely used. However, users of Adobe’s program for Windows and MacOS are currently exposed to a high security risk. Criminals exploit a vulnerability (CVE-2026-34621) is actively used to execute malicious code on the victims’ systems when opening prepared PDF documents and to install ransomware or programs to steal data. There is no need for user interaction beyond simply opening a file. Adobe has already provided a patch and recommends installing it immediately. The problem is technically based on a so-called “Prototype Pollution”. With such a vulnerability, attackers manipulate the properties of the application objects. Since Acrobat Reader is standard equipment in many company networks, the potential attack surface is enormous. IT departments should act quickly to protect networks from further infiltration.

Like Adobe in one Security Bulletin warns, the threat should be classified as critical. Security researchers report that attacks have been occurring since December 2025. For example, decoy documents in Russian are used that purport to contain information about the oil and gas industry.

Protection measures and updates

To protect yourself, users should install the patches provided immediately. The vulnerability affects the following versions of the software:

  • Acrobat DC – All versions before 26.001.21411
  • Acrobat Reader DC – All versions before 26.001.21411
  • Acrobat 2024 – All versions before 24.001.30362 (Windows)
  • Acrobat 2024 – All versions before 24.001.30360 (MacOS)

The update can be carried out directly in the program menu under “Help” > “Check for updates”. If you cannot install the update directly, you should take temporary protective measures. These include disabling JavaScript in Acrobat’s settings and opening file attachments in an isolated sandbox environment.

In addition, revoking local administrator rights for standard users is an effective protection. The Portable Document Format was originally developed in the early 1990s for platform-independent display. Today the format is a global standard for document exchange. The wide distribution makes reading and processing programs a lucrative target for hackers.

Leave a Reply