Description

Adobe has patched a critical zero-day vulnerability (CVE-2026-34621) in Acrobat and Reader that was actively exploited in real-world attacks. The flaw allows threat actors to execute arbitrary code on a victim’s system by delivering specially crafted PDF files. Once opened, these malicious PDFs trigger embedded JavaScript, enabling attackers to access sensitive data, interact with local files, and potentially deploy additional payloads. The vulnerability has reportedly been exploited since late 2025, making it a significant security concern for organizations and individuals relying on PDF workflows. The root cause of the issue lies in a prototype pollution vulnerability within the JavaScript engine of Adobe Acrobat Reader. This weakness allows attackers to manipulate object properties and alter application behavior, bypassing intended security controls. By abusing trusted functions, attackers can read local file contents and exfiltrate them to remote servers. The attack may also involve multiple stages, where initial exploitation is used for reconnaissance, followed by selective deployment of more advanced payloads such as sandbox escapes or full remote code execution. To mitigate the risk, users and organizations should immediately update Adobe Acrobat and Reader to the latest patched versions. It is recommended to avoid opening PDF files from unknown or untrusted sources and to disable JavaScript execution in PDF readers wherever possible. Additionally, implementing endpoint detection and response (EDR) solutions, monitoring suspicious file activity, and applying strict email filtering policies can help prevent exploitation attempts. Regular security updates and user awareness remain critical to reducing exposure.