Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621
好的,我现在要帮用户总结这篇文章的内容,控制在100个字以内。首先,我需要通读整篇文章,抓住关键信息。 文章主要讲的是Adobe发布了紧急更新,修复了Acrobat Reader中的一个关键安全漏洞。这个漏洞被积极利用了,CVSS评分为8.6。漏洞类型是原型污染,可能导致任意代码执行。受影响的产品包括Acrobat DC、Reader DC和Acrobat 2024的某些版本。Adobe承认该漏洞已被野外利用,安全研究员Haifei Li也披露了相关细节。 接下来,我需要将这些信息浓缩到100字以内。重点包括:Adobe修复漏洞、漏洞类型、影响版本、CVSS评分以及被利用的情况。 可能的结构是:Adobe修复Acrobat Reader中的关键漏洞(CVE-2026-34621),CVSS 8.6分,原型污染导致代码执行,影响多个版本,已野外利用。 检查字数是否在限制内,并确保信息准确无误。 </think> Adobe修复Acrobat Reader中的关键安全漏洞(CVE-2026-34621),CVSS评分8.6分。该漏洞为原型污染类型,可能导致任意代码执行。影响多个版本的Acrobat DC、Reader DC及Acrobat 2024。已确认被野外利用。 2026-4-12 04:25:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Vulnerability / Endpoint Security

Acrobat Reader Flaw CVE-2026-34621

Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild.

The vulnerability, assigned the CVE identifier CVE-2026-34621, carries a CVSS score of 8.6 out of 10.0. Successful exploitation of the flaw could allow an attacker to run malicious code on affected installations.

It has been described as a case of prototype pollution that could result in arbitrary code execution. Prototype pollution refers to a JavaScript security vulnerability that permits an attacker to manipulate an application'sobjects and properties.

The issue impacts the following products and versions for both Windows and macOS -

  • Acrobat DC versions 26.001.21367 and earlier (Fixed in 26.001.21411)
  • Acrobat Reader DC versions 26.001.21367 and earlier (Fixed in 26.001.21411)
  • Acrobat 2024 versions 24.001.30356 and earlier (Fixed in 24.001.30362 for Windows and 24.001.30360 for macOS)

Adobe acknowledged that it's "aware of CVE-2026-34621 being exploited in the wild."

The development comes days after security researcher and EXPMON founder Haifei Li disclosed details of zero-day exploitation of the flaw to run malicious JavaScript code when opening specially crafted PDF documents through Adobe Reader. There is evidence suggesting that the vulnerability may have been under exploitation since December 2025.

"It appears that Adobe has determined the bug can lead to arbitrary code execution — not just an information leak," EXPMON said in a post on X. "This aligns with our findings and those of other security researchers over the last few days."

(The story was updated after publication to reflect the change in CVSS score from 9.6 to 8.6. In a revision to its advisory on April 12, 2026, Adobe said it adjusted the attack vector from Network (AV:N) to Local (AV:L).)

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/adobe-patches-actively-exploited.html
如有侵权请联系:admin#unsafe.sh