¿ì²¥ÊÓÆµ

Skip to main content Skip to local navigation

Adobe Acrobat security vulnerability (CVE-2026-34621)

 

A picture containing text  Description automatically generated

 

Information Security Advisory


A recently disclosed high‑severity vulnerability in Adobe Acrobat and Acrobat Reader (°ä³Õ·¡â€‘2026‑34621) allows attackers to execute arbitrary code on affected systems by tricking users into opening a specially crafted PDF file.

Severity level:

CVSS Score: 8.6/High

Description:
Adobe Acrobat and Acrobat Reader contain an improperly controlled modification of object prototype attributes (Prototype Pollution) vulnerability. The flaw exists in the handling of JavaScript objects within PDF documents. In vulnerable versions, opening a maliciously crafted PDF allows an attacker to manipulate JavaScript object prototypes and invoke privileged APIs. This can result in arbitrary code execution in the context of the current user.

Affected Versions
:
Acrobat DC: 26.001.21367 and earlier.
Acrobat Reader DC: 26.001.21367 and earlier.
Acrobat 2024: 24.001.30356 and earlier.
Platforms: Windows and macOS.

Impact:
Successful exploitation may result in arbitrary code execution on the affected system.

Resolution:
Adobe strongly recommends immediately upgrading to the latest patched versions:

Acrobat DC / Acrobat Reader DC: 26.001.21411 or later.
Acrobat 2024: Windows: 24.001.30362 or later and macOS: 24.001.30360 or later.

Reference:

 

Information Security 

Contact

IT Client Services at askIT@yorku.ca or 416 736 5800

 

 

PRIVACY POLICY | VISIT WWW.YORKU.CA
This email was sent by: ¿ì²¥ÊÓÆµ, 4700 Keele Street, Toronto, Ontario M3J 1P3

This email is viewed best in Microsoft Outlook for web