Fixing and finding
Jump to remediation plan
CVE ID

CVE-2026-34621

Published 2026-04-11
Updated 25 days ago
Vendor/s
Adobe
Product/s
Acrobat and Reader
Version/s
* > 26.001.21411
KEV Status
Active Exploitation
Listed in CISA's Known Exploited Vulnerabilities catalogue. Active exploitation observed in the wild.
CVSS Score (v3.1)
8.6
/ 10
High
Severity Details
Base score
8.6 High
Attack vector
Local
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Description

CVE-2026-34621 is a high-severity prototype pollution flaw in Adobe Acrobat and Reader that allows arbitrary code execution via malicious files.

CPE

Adobe logo
Adobe
Product Version Start Version End (excl.) Status
acrobat_dc * 26.001.21411 vulnerable
acrobat_reader_dc * 26.001.21411 vulnerable
macos - - unaffected
windows - - unaffected
acrobat 24.0.0 24.001.30362 vulnerable
windows - - unaffected
acrobat 24.0.0 24.001.30360 vulnerable
macos - - unaffected

Related weakness (CWE)

CWE-1321

Remediation plan

1

Apply official patches

Immediately deploy the security updates provided by Adobe in security bulletin APSB26-43. These patches specifically address the Improperly Controlled Modification of Object Prototype Attributes.

2

Update affected systems

Ensure Adobe Acrobat DC and Reader DC are updated to version 26.001.21411 or later. For Acrobat 2024, ensure systems are running at least version 24.001.30362 on Windows or 24.001.30360 on macOS.

3

Restrict access

Enable 'Protected Mode' and 'Enhanced Security' settings within Adobe Acrobat and Reader to sandbox the application. Additionally, use email security gateways to block or scan suspicious PDF attachments from untrusted external sources.

4

Monitor for exploitation

Use Endpoint Detection and Response (EDR) tools to monitor for suspicious child processes spawned by Acrobat.exe, such as cmd.exe or powershell.exe, which may indicate successful arbitrary code execution.

Detection Guidance

To detect potential exploitation of CVE-2026-34621, monitor endpoint logs for Adobe Acrobat or Reader spawning unexpected shell processes or making unusual outbound network connections. Look for crash logs associated with Acrobat's JavaScript engine. Security teams should also use vulnerability scanners to identify any instances of Acrobat DC or Reader DC older than version 26.001.21411, as these remain high-risk targets for this actively exploited vulnerability.

References

Sources

NIST National Vulnerability Database (NVD)
CISA Known Exploited Vulnerabilities (KEV)

Experience superior visibility and a simpler approach to cyber risk management