[CIVN-2026-0192] Arbitrary Code Execution Vulnerability in Adobe Acrobat Reader

By Published On: April 18, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Arbitrary Code Execution Vulnerability in Adobe Acrobat Reader


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Adobe Acrobat Reader versions 26.001.21411 and earlier on Windows and macOS

Overview


A vulnerability has been reported in Adobe Acrobat Reader which could allow a remote attacker to execute arbitrary code on the targeted system.


Target Audience:

System Administrators, Organizations and end users using Adobe Acrobat Reader.


Risk Assessment:

High risk of arbitrary code execution due to remote exploitation through specially crafted PDF files.


Impact Assessment:

Potential for arbitrary code execution, system compromise, data theft, or unauthorized access.


Description


Adobe Acrobat and Reader is widely used application for viewing, printing, and managing PDF documents.


The vulnerability exists in Adobe Acrobat Reader due to improper handling of specially crafted PDF files. An attacker could exploit this flaw by tricking a user into opening a malicious PDF document.


Successful exploitation could allow an attacker to execute arbitrary code in the context of the current user.


Note: This vulnerability (CVE-2026-34621) is being actively exploited in the wild.


Solution


Apply appropriate updates as mentioned by the vendor:

https://helpx.adobe.com/security/products/acrobat/apsb26-43.html



Vendor Information


Adobe

https://www.adobe.com/


References


 

https://helpx.adobe.com/security/products/acrobat/apsb26-43.html


CVE Name

CVE-2026-34621




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnjZZ8ACgkQ3jCgcSdc

ys827g/+KKLSaLXUanLARBd8CSkBzWOr/vQLVToVIty5dBKh5luu+kmExDelKcGn

f5dxSreH/FtMu39z7QO43Yyi1u0gS+mJ22hyIgPsp55Rxt5ZqL0xzzDgVtMQOnte

CaMR7pm3nPOAZsQex3aMyYvTPHk3qhwp2h33Mguf+2AlLv8IrqS6PagfUZvbxOui

j31ZwGrlen1xuphGdLILeLavei3rw8k9Bc4EKE57rpZw3rJJjAOgx+TFQx5s+rXe

w82BJrgf4hGGtsKMIAH6MyTpOkRuEN77ukR4HX2NqZ1KH3SqPL2ut5OzV1Jx6fu4

TQL9heGgLXrDGnexd7Xu4vvk/Hhi6xSd1GoUf9zHzsYh7F3tGUIxkkFcmMHtF3b4

A5rcs3VmP3D5GJvr2nEsfE4PkVEZajoFZ9gJQocr1F9fRX+BAjqg/cyJ+uRIPWJP

OGz7GmHwBRAJOIWwVBzSyYF/iK+sFn3REuwzL2eS0+8jcYKgZLdKZhpTKs1tHDt+

EFJ8wmbLL4/gegINtOto9ZdCq2Z4+hmbhdeYhRR/laMKUgQJRnX8rBVxz464diXm

n0PWsCY8qHz6rmDTyvNtswh1tFp8BQuC1BR/pXmxU8NuEPF2KEBqsZVhhBZ+/uIt

kjk4MJy/kZcjdAAYU8+XF4StKfUZzcNU+9IzBB6DokPVuFpY/Ao=

=kpPu

—–END PGP SIGNATURE—–

Share this article