Adobe Patches Reader Zero-Day Exploited for Months
Security WeekArchived Apr 12, 2026✓ Full text saved
The vulnerability is tracked as CVE-2026-34621 and Adobe has confirmed that it can be exploited for arbitrary code execution. The post Adobe Patches Reader Zero-Day Exploited for Months appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
Adobe on Saturday released emergency patches for a critical Acrobat and Reader zero-day that has been exploited in the wild for several months.
The vulnerability has been assigned the CVE identifier CVE-2026-34621 and a CVSS score of 9.6. According to the software giant, the flaw stems from improperly controlled modifications to prototype attributes and can be exploited to execute arbitrary code.
Acrobat and Reader for Windows and macOS are affected. Patches are included in version 26.001.21411 of Acrobat DC and Acrobat Reader DC, and versions 24.001.30362 and 24.001.30360 of Acrobat 2024.
Adobe’s advisory confirms that CVE-2026-34621 has been exploited in the wild.
The company has credited Haifei Li for reporting the vulnerability. Li is a reputable researcher who has worked at Fortinet, McAfee, Microsoft, and Check Point. He is the founder of Expmon, a sandbox system designed to detect file-based exploits.
Li came across the zero-day while analyzing a sophisticated PDF exploit uploaded to Expmon. The exploit he identified was designed to harvest information, but the researcher warned in his initial disclosure that subsequent stages in the exploit chain may include remote code execution and a sandbox escape.
Adobe has confirmed that exploitation of CVE-2026-34621 can lead to code execution, rather than just information disclosure.
Based on the analysis of an exploit sample uploaded to VirusTotal, researchers determined that exploitation of CVE-2026-34621 started as early as November 2025.
Li indicated that an APT is likely behind the attacks, and a threat intelligence analyst who uses the online moniker Gi7w0rm noted that the malicious PDFs used Russian-language lures and referenced current events in Russia’s oil and gas sector.
More information on who is behind the attacks will likely surface in the coming days as more members of the cybersecurity community analyze the exploits.
Li has made technical details available, and others have released indicators of compromise (IoCs) to help defenders detect potential exploitation of CVE-2026-34621.
Related: Juniper Networks Patches Dozens of Junos OS Vulnerabilities
Related: Orthanc DICOM Vulnerabilities Lead to Crashes, RCE
Related: Critical Marimo Flaw Exploited Hours After Public Disclosure
WRITTEN BY
Eduard Kovacs
Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users
Apple Intelligence AI Guardrails Bypassed in New Attack
Adobe Reader Zero-Day Exploited for Months: Researcher
$3.6 Million Stolen in Bitcoin Depot Hack
Data Leakage Vulnerability Patched in OpenSSL
Massachusetts Hospital Diverts Ambulances as Cyberattack Causes Disruption
US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking
Severe StrongBox Vulnerability Patched in Android
Latest News
In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer Hack
Juniper Networks Patches Dozens of Junos OS Vulnerabilities
Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday
Orthanc DICOM Vulnerabilities Lead to Crashes, RCE
Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000
MITRE Releases Fight Fraud Framework
Critical Marimo Flaw Exploited Hours After Public Disclosure
Google Rolls Out Cookie Theft Protections in Chrome
Trending
Webinar: A Step-By-Step Approach To AI Governance
April 28, 2026
With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.
Register
Virtual Event: Threat Detection And Incident Response Summit
May 20, 2026
Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.
Register
People on the Move
The United States Department of War appointed David Vaughn as Technical Advisor for Data Infrastructure.
Black Duck has named Dom Glavach as Chief Information Security Officer.
Finite State has named Ann Miller as Vice President of Marketing.
More People On The Move
Expert Insights
The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security
Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb)
The New Rules Of Engagement: Matching Agentic Attack Speed
The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael)
The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust
Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin)
Why Agentic AI Systems Need Better Governance – Lessons From OpenClaw
Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor)
The Human IOC: Why Security Professionals Struggle With Social Vetting
Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb)
Flipboard
Reddit
Whatsapp
Email