Published on: 13 April 2026
Patches are released for Adobe Reader and Acrobat to address a vulnerability. A remote attacker would entice a targeted user to open a specially crafted PDF file to exploit the vulnerability.
Reports indicated that the remote code execution vulnerability (CVE-2026-34621) in Adobe Reader and Acrobat is being exploited in the wild. System administrators and users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Successful exploitation of the vulnerability could lead to remote code execution on an affected system.
System administrators and users of affected systems should update the Adobe Reader and Acrobat to the following versions to address the issue. The updates can be obtained by using the auto-update mechanism or by downloading at the following URLs:
Acrobat DC (for Windows and macOS) Continuous 26.001.21411
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
Acrobat Reader DC (for Windows and macOS) Continuous 26.001.21411
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
Acrobat 2024 (for Windows) Classic 2024 24.001.30362
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#adobe-acrobat-2024-track
Acrobat 2024 (for macOS) Classic 2024 24.001.30360
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#adobe-acrobat-2024-track