Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是Adobe发布了紧急安全更新,修复了一个严重的Acrobat Reader漏洞,编号是CVE-2026-34621。这个漏洞已经被用于真实世界的攻击中。漏洞的CVSS评分为8.6,影响多个Windows和macOS版本的Acrobat和Reader产品。攻击者可以利用这个漏洞执行任意代码。 接下来,文章详细说明了漏洞的影响范围,包括哪些版本的产品受到影响,并且提到了Adobe发布的补丁版本。此外,漏洞的根本原因是原型污染问题,属于CWE-1321类别。Adobe已经确认这个漏洞正在被积极利用,所以修复非常紧急。 用户的需求是总结内容,控制在100字以内。所以我要提炼关键点:Adobe修复严重漏洞CVE-2026-34621,影响多个Acrobat和Reader版本,CVSS评分8.6,允许任意代码执行,已用于真实攻击中,并提供了补丁。 </think> Adobe修复了严重漏洞CVE-2026-34621,影响Acrobat DC、Reader DC及Acrobat 2024等多个版本。该漏洞CVSS评分8.6,可致任意代码执行,并已被用于真实攻击中。建议用户立即更新至最新版本以修复此高危缺陷。 2026-4-13 08:28:48 Author: thecyberexpress.com(查看原文) 阅读量:18 收藏

Adobe has issued emergency security updates addressing a severe Acrobat Reader flaw tracked as CVE-2026-34621, a high-impact Adobe vulnerability that has already been observed being exploited in real-world attacks.  

The issue, rated with a CVSS score of 8.6 out of 10.0, affects multiple Acrobat and Reader products across Windows and macOS platforms. According to Adobe, the vulnerability could enable attackers to execute arbitrary code on targeted systems if successfully exploited. 

Acrobat Reader Flaw and CVSS Severity Assessment 

The Acrobat Reader flaw CVE-2026-34621 has been classified as a critical security defect with a CVSS base score of 8.6. The scoring notes impact potential, including confidentiality, integrity, and availability compromise. The CVSS vector associated with the flaw is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H, indicating that local access and user interaction are required for exploitation, while the scope change increases the severity. 

Initially, the Adobe vulnerability was assessed with a higher score, but later revisions adjusted the attack vector from network-based (AV:N) to local (AV:L). This change reduced the overall CVSS rating from 9.6 to 8.6, as noted in Adobe’s revision history dated April 12, 2026. 

Adobe Vulnerability Impact and Affected Acrobat Products 

The Adobe vulnerability affects several widely deployed versions of Acrobat and Acrobat Reader. The impacted software includes: 

  • Acrobat DC versions 26.001.21367 and earlier (fixed in 26.001.21411)  
  • Acrobat Reader DC versions 26.001.21367 and earlier (fixed in 26.001.21411)  
  • Acrobat 2024 versions 24.001.30356 and earlier (fixed in 24.001.30362 for Windows and 24.001.30360 for macOS)  

These versions are used across both Windows and macOS environments, increasing the exposure range of the Acrobat Reader flaw CVE-2026-34621 in enterprise and consumer settings. 

report-ad-banner

Adobe classified the update under bulletin APSB26-43, published on April 11, 2026, with a priority rating of 1, indicating the highest urgency level for patch deployment. The bulletin confirms that the Adobe vulnerability can result in arbitrary code execution if exploited successfully. 

Exploitation of Acrobat Reader flaw CVE-2026-34621 in the Wild 

Adobe has confirmed that it is “aware of CVE-2026-34621 being exploited in the wild.” This statement indicates active exploitation attempts against unpatched systems, elevating the urgency of the Acrobat Reader flaw CVE-2026-34621 beyond theoretical risk. 

The exploitation activity suggests that threat actors may already be leveraging the Adobe vulnerability in targeted attacks. While specific campaigns have not been fully detailed publicly, the confirmed exploitation status places the flaw in a high-risk category, particularly for organizations that have not yet applied for the latest updates. 

Prototype Pollution Behind the Adobe Vulnerability 

The root cause of the Acrobat Reader flaw CVE-2026-34621 is identified as a prototype pollution issue. Prototype pollution is a JavaScript-based vulnerability class that allows attackers to manipulate object prototypes within an application. 

In this case, the Adobe vulnerability is categorized under CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes). Successful exploitation could allow an attacker to manipulate internal object structures, potentially leading to arbitrary code execution within Acrobat environments. 

Because prototype pollution affects how objects inherit properties, attackers may be able to inject malicious attributes into running applications, escalating the severity of the Acrobat Reader flaw CVE-2026-34621 when combined with user interaction. 

CVSS-rated fix and APSB26-43 remediation guidance 

Adobe addressed the Adobe vulnerability through security updates released under bulletin APSB26-43. Fixed versions include: 

  • Acrobat DC and Acrobat Reader DC: 26.001.21411  
  • Acrobat 2024: 24.001.30362 (Windows), 24.001.30360 (macOS)  

Adobe recommends immediate updating via built-in update mechanisms (Help > Check for Updates) or through managed deployment systems in enterprise environments such as AIP-GPO, SCUP/SCCM, Apple Remote Desktop, or SSH-based workflows on macOS. Full installers are also available through Adobe’s official download channels. 

The CVSS scoring for the Adobe vulnerability CVE-2026-34621 was revised on April 12, 2026. The adjustment reduced the attack vector classification from network (AV:N) to local (AV:L), resulting in a revised CVSS score of 8.6. 

Adobe credited researcher Haifei Li of EXPMON for reporting the issue and coordinating disclosure efforts. 


文章来源: https://thecyberexpress.com/acrobat-reader-flaw-adobe-cve-2026-34621/
如有侵权请联系:admin#unsafe.sh