Adobe Patches Reader Zero-Day Exploited for Months
Adobe patches critical Reader zero-day (CVE-2026-34621) exploited in wild since November 2025.
Summary
Adobe released emergency patches for CVE-2026-34621, a critical zero-day vulnerability in Acrobat and Reader affecting Windows and macOS with a CVSS score of 9.6. The flaw, stemming from improper prototype attribute handling, enables arbitrary code execution and has been actively exploited in the wild since at least November 2025. Researcher Haifei Li discovered the vulnerability via malicious PDFs with Russian-language lures, likely linked to an APT group targeting Russia's oil and gas sector.
Full text
Adobe on Saturday released emergency patches for a critical Acrobat and Reader zero-day that has been exploited in the wild for several months. The vulnerability has been assigned the CVE identifier CVE-2026-34621 and a CVSS score of 9.6. According to the software giant, the flaw stems from improperly controlled modifications to prototype attributes and can be exploited to execute arbitrary code. Acrobat and Reader for Windows and macOS are affected. Patches are included in version 26.001.21411 of Acrobat DC and Acrobat Reader DC, and versions 24.001.30362 and 24.001.30360 of Acrobat 2024. Adobe’s advisory confirms that CVE-2026-34621 has been exploited in the wild. The company has credited Haifei Li for reporting the vulnerability. Li is a reputable researcher who has worked at Fortinet, McAfee, Microsoft, and Check Point. He is the founder of Expmon, a sandbox system designed to detect file-based exploits. Li came across the zero-day while analyzing a sophisticated PDF exploit uploaded to Expmon. The exploit he identified was designed to harvest information, but the researcher warned in his initial disclosure that subsequent stages in the exploit chain may include remote code execution and a sandbox escape. Advertisement. Scroll to continue reading. Adobe has confirmed that exploitation of CVE-2026-34621 can lead to code execution, rather than just information disclosure. Based on the analysis of an exploit sample uploaded to VirusTotal, researchers determined that exploitation of CVE-2026-34621 started as early as November 2025. Li indicated that an APT is likely behind the attacks, and a threat intelligence analyst who uses the online moniker Gi7w0rm noted that the malicious PDFs used Russian-language lures and referenced current events in Russia’s oil and gas sector. More information on who is behind the attacks will likely surface in the coming days as more members of the cybersecurity community analyze the exploits. Li has made technical details available, and others have released indicators of compromise (IoCs) to help defenders detect potential exploitation of CVE-2026-34621. Related: Juniper Networks Patches Dozens of Junos OS Vulnerabilities Related: Orthanc DICOM Vulnerabilities Lead to Crashes, RCE Related: Critical Marimo Flaw Exploited Hours After Public Disclosure Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet UsersApple Intelligence AI Guardrails Bypassed in New AttackAdobe Reader Zero-Day Exploited for Months: Researcher$3.6 Million Stolen in Bitcoin Depot HackData Leakage Vulnerability Patched in OpenSSLMassachusetts Hospital Diverts Ambulances as Cyberattack Causes Disruption US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS HijackingSevere StrongBox Vulnerability Patched in Android Latest News In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer HackJuniper Networks Patches Dozens of Junos OS VulnerabilitiesIndustry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback FridayOrthanc DICOM Vulnerabilities Lead to Crashes, RCEChrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000MITRE Releases Fight Fraud FrameworkCritical Marimo Flaw Exploited Hours After Public DisclosureGoogle Rolls Out Cookie Theft Protections in Chrome Trending Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: A Step-by-Step Approach to AI Governance April 28, 2026 With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveThe United States Department of War appointed David Vaughn as Technical Advisor for Data Infrastructure.Black Duck has named Dom Glavach as Chief Information Security Officer.Finite State has named Ann Miller as Vice President of Marketing.More People On The MoveExpert Insights The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin) Why Agentic AI Systems Need Better Governance – Lessons from OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) The Human IOC: Why Security Professionals Struggle with Social Vetting Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb) Flipboard Reddit Whatsapp Whatsapp Email
Indicators of Compromise
- cve — CVE-2026-34621