CVE-2026-34621
Adobe · Acrobat Reader
Adobe Acrobat Reader is vulnerable to prototype pollution, which can result in arbitrary code execution when a victim opens a malicious file.
Executive summary
A critical prototype pollution vulnerability in Adobe Acrobat Reader allows attackers to execute arbitrary code on the victim's machine through malicious file interaction.
Vulnerability
This is a prototype pollution vulnerability that allows for the modification of object attributes. Exploitation requires user interaction, specifically the opening of a malicious file, which then triggers arbitrary code execution in the user's context.
Business impact
With a CVSS score of 9.6, this is a critical vulnerability. An attacker can gain control over a user's workstation, potentially accessing sensitive documents, credentials, and internal network resources, leading to significant reputational and operational damage.
Remediation
Immediate Action: Update Adobe Acrobat Reader to the latest patched version immediately.
Proactive Monitoring: Monitor for suspicious file access patterns or unusual application behavior following the opening of unexpected documents.
Compensating Controls: Implement endpoint protection (EDR) to detect and block malicious code execution originating from PDF reader processes.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Organizations should mandate that all users update Acrobat Reader to the latest version to prevent potential client-side exploitation. User awareness training regarding opening unsolicited documents is also recommended.