Published on: 11 June 2025
Patches are released for Adobe Reader and Acrobat to address multiple vulnerabilities. A remote attacker would entice a targeted user to open a specially crafted PDF file to exploit the vulnerabilities.
Successful exploitation of the vulnerabilities could lead to arbitrary code execution, denial of service, information disclosure or security restriction bypass on an affected system.
Users of affected systems should update the Adobe Reader and Acrobat to the following versions to address the issues. The updates can be obtained by using the auto-update mechanism or by downloading at the following URLs:
Acrobat DC (for Windows) Continuous 25.001.20531
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
Acrobat DC (for macOS) Continuous 25.001.20529
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
Acrobat Reader DC (for Windows) Continuous 25.001.20531
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
Acrobat Reader DC (for macOS) Continuous 25.001.20529
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
Acrobat 2024 (for Windows and macOS) Classic 2024 24.001.30254
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#acrobat-classic-track
Acrobat 2020 (for Windows and macOS) Classic 2020 20.005.30774
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#classic-track
Acrobat Reader 2020 (for Windows and macOS) Classic 2020 20.005.30774
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#classic-track