đź“° Full Story
Adobe released emergency patches in April 2026 for a critical zero-day tracked as CVE-2026-34621 that security researchers say was actively exploited for months.
The flaw affected Acrobat DC, Acrobat 2024 and Reader DC on Windows and macOS and was disclosed after researcher Haifei Li of EXPMON analyzed a malicious PDF sample first seen on VirusTotal in late 2025.
Attackers used obfuscated JavaScript inside crafted PDFs to fingerprint hosts (collecting OS and Reader versions, language settings and file paths) and selectively deploy a second-stage payload capable of remote code execution or sandbox escape.
Initial severity was rated 9.6 but Adobe reassessed the vector and set the CVSS to 8.6.
Evidence from researchers points to targeted, selective profiling—some lures referenced oil and gas themes and Russian-language content—raising concerns about espionage-style campaigns.
Adobe confirmed exploitation in the wild, urged immediate updates and provided fixes across affected builds; agencies including CISA added the flaw to known exploited vulnerabilities, mandating remediation timelines.
No practical workaround was available, so patching and endpoint review were recommended as the primary mitigations.
đź”— Based On
🕰️ The Story So Far: An Evolving Timeline
Tuesday, April 14, 2026 17:15 UTC
Adobe patches critical Acrobat Reader zero-day exploit
Saturday, April 11, 2026 10:04 UTC
Adobe Reader zero-day exploited by malicious PDFs








đź’¬ Commentary