Description
Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Published: 2026-03-10
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary code execution
Action: Patch Immediately
AI Analysis

Impact

Adobe Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and all earlier releases contain a use‑after‑free flaw in the PDF processing engine. The flaw occurs after memory is freed but a reference to that memory is still used, allowing an attacker to overwrite the freed area and execute arbitrary code. When a victim opens a specially crafted PDF file, the vulnerability can be triggered, resulting in code execution with the privileges of the user who opens the file.

Affected Systems

The affected products are Adobe Acrobat Reader – both the classic and DC continuous editions – on all major desktop platforms. The known affected versions include 24.001.30307, 24.001.30308, 25.001.21265 and any earlier release of Acrobat Reader. The vulnerability applies to Windows and macOS operating systems where the software is installed.

Risk and Exploitability

The severity score of 7.8 indicates a high impact. The EPSS score is below 1 %, suggesting that the probability of exploitation is low at present. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires the user to deliberately open a malicious PDF file, so the attack vector is local user interaction. Because the code runs with the current user’s privileges, it can compromise the user’s data, elevate privileges, or allow persistence. While remote exploitation is not possible, an adversary can use social engineering to deliver the file.

Generated by OpenCVE AI on April 16, 2026 at 03:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Adobe Acrobat Reader update that contains the use‑after‑free fix.
  • Disable automatic opening of PDF attachments in email clients and use a sandboxed PDF viewer for untrusted documents.
  • Educate users to avoid opening PDF files from unknown sources and to verify the sender’s legitimacy.

Generated by OpenCVE AI on April 16, 2026 at 03:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Adobe acrobat
Adobe acrobat Dc
Adobe acrobat Reader Dc
Apple
Apple macos
Microsoft
Microsoft windows
CPEs cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*
cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*
cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Adobe acrobat
Adobe acrobat Dc
Adobe acrobat Reader Dc
Apple
Apple macos
Microsoft
Microsoft windows

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe acrobat Reader
Vendors & Products Adobe
Adobe acrobat Reader

Tue, 10 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Title Acrobat Reader | Use After Free (CWE-416)
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Adobe Acrobat Acrobat Dc Acrobat Reader Acrobat Reader Dc
Apple Macos
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-03-12T03:55:16.369Z

Reserved: 2026-02-18T22:02:41.389Z

Link: CVE-2026-27278

cve-icon Vulnrichment

Updated: 2026-03-11T13:42:52.656Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T22:16:18.257

Modified: 2026-03-11T18:07:53.673

Link: CVE-2026-27278

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T03:15:22Z

Weaknesses