VulnerabilitiesHIGH

Adobe Reader - Zero-Day Vulnerability Under Active Exploitation

#Adobe Reader#zero-day#vulnerability#cybersecurity#malware#remote code execution#social engineering

Original Reporting

SOSophos News

AI Intelligence Briefing

CyberPings AIยทReviewed by Rohit Rana
Severity LevelHIGH

Significant risk โ€” action recommended within 24-48 hours

๐Ÿ›ก๏ธ
๐Ÿ›ก๏ธ VULNERABILITY DETAILS
CVE IDโ€”
CVSS Scoreโ€”
Severity RatingHIGH
Affected ProductAdobe Reader
VendorAdobe
Vulnerability TypeRemote Code Execution
Attack VectorMalicious PDF Files
Attack ComplexityLow
Privileges RequiredHigh
User InteractionRequired
Actively ExploitedYes
Patch AvailableNo
Workaround AvailableYes
๐ŸŽฏ

Hackers found a way to trick Adobe Reader into running bad code when you open certain PDF files. This can let them steal your information or take control of your computer. It's been happening since last December, and there's no fix yet, so be careful with PDFs for now!

Quick Summary

A zero-day vulnerability in Adobe Reader has been exploited since December 2025, allowing attackers to execute privileged APIs via malicious PDFs. Security experts urge immediate action.

The Flaw

On April 7, 2026, security researcher Haifei Li revealed a zero-day vulnerability in Adobe Reader that has been exploited since at least December 2025. This vulnerability allows threat actors to execute privileged Acrobat APIs through specially crafted malicious PDF files that run obfuscated JavaScript upon opening. The exploit leverages functions like util.readFileIntoStream() to access local files and collect sensitive information, which is then sent to a remote server using RSS.addFeed(). This sophisticated attack method indicates a high level of technical skill and planning by the attackers.

What's at Risk

The attacks primarily target users in the Russian oil and gas sector, as indicated by the Russian-language lures found in the malicious documents. The exploitation can lead to significant risks, including the theft of sensitive user and system data, remote code execution (RCE), and potential sandbox escape (SBX) exploits. Researchers have confirmed that the vulnerability operates on the latest version of Adobe Reader, heightening the urgency for users to address this issue.

Patch Status

As of now, there is no official patch available from Adobe for this vulnerability. Security experts are urging organizations to remain vigilant and monitor for any updates from Adobe regarding a fix.

Immediate Actions

Organizations are advised to take the following steps to mitigate risks:

  • Automatically scan PDF email attachments for potential threats.
  • Block suspicious files and educate users about the dangers of unsolicited attachments.
  • Temporarily avoid using Adobe Reader to open PDFs until a patch is released.
  • Engage with cybersecurity communities to analyze the exploit further and understand its implications.

Technical Details

The malicious PDFs, including samples named "Invoice540.pdf," have been flagged on platforms like VirusTotal, with detection rates as low as 13 out of 64 antivirus engines. This highlights the sophistication of the attack, which may evade traditional security measures. The ongoing exploitation of this zero-day vulnerability underscores the need for advanced detection methods and expert analysis to identify and respond to such threats effectively.

Protections and Threat Indicators

Sophos has identified specific protections related to this threat, including:

  • Troj/PDFโ€‘BG
  • Malware/Callhome

The threat indicators for detecting this activity include various hashes associated with the malicious PDF samples and known IP addresses linked to command and control servers used in the attacks. Notably, the IP address 169.40.2.68:45191 and a new variant connecting to 188.214.34.20:34123 have been highlighted as part of the exploit's infrastructure.

This situation remains fluid, and security researchers continue to analyze the exploit's capabilities and its impact on users worldwide. Organizations are encouraged to stay informed and proactive in their cybersecurity measures.

๐Ÿ” How to Check If You're Affected

  1. 1.Monitor for unusual PDF file behavior in Adobe Reader.
  2. 2.Check for known malicious hashes associated with the exploit.
  3. 3.Implement advanced threat detection systems for PDF attachments.

๐Ÿข Impacted Sectors

Oil and GasCorporateGovernment

Pro Insight

The exploitation of this zero-day vulnerability highlights the importance of advanced detection methods in identifying sophisticated attacks that traditional security tools may miss. Organizations should prioritize user training and implement robust scanning measures for PDF files.

๐Ÿ—“๏ธ Story Timeline

Story broke by Sophos News
Covered by The Hacker News
Covered by Security Affairs

Sources

Original Report

SOSophos News
Read Original

Also covered by

THThe Hacker News

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

Read
SESecurity Affairs

Malicious PDF reveals active Adobe Reader zero-day in the wild

Read

Related Pings

CRITICALVulnerabilities

Junos OS Vulnerabilities - Critical Flaw Patched by Juniper

Juniper Networks has patched multiple vulnerabilities in Junos OS, including a critical flaw that allows remote device takeover. Users must update immediately to avoid risks.

SecurityWeekยท
CRITICALVulnerabilities

Active Exploitation of SolarWinds Web Help Desk Alert

Huntress has reported active exploitation of a critical vulnerability in SolarWinds Web Help Desk. This flaw allows remote code execution, posing serious risks. Organizations must act quickly to secure their systems.

Huntress Blogยท
HIGHVulnerabilities

App Domain Manager Injection - Understanding the Threat

Attackers are exploiting App Domain Manager injection to run harmful code in trusted .NET applications. This poses serious security risks. Learn how to detect and prevent these attacks.

Huntress Blogยท
HIGHVulnerabilities

CISA KEV Remediation Analysis - Limits of Human Security Exposed

A new analysis reveals that critical vulnerabilities are often exploited before patches can be applied. This highlights a major flaw in traditional security practices, urging organizations to rethink their vulnerability management strategies.

BleepingComputerยท
HIGHVulnerabilities

NetBT e-Fatura - Privilege Escalation Vulnerability Exposed

A new vulnerability in NetBT e-Fatura allows local users to escalate privileges and execute arbitrary code. This flaw poses a serious security risk, potentially compromising sensitive data. Immediate actions are needed to mitigate the threat.

Exploit-DBยท
HIGHVulnerabilities

Industrial Controllers Vulnerable - Cyber Conflicts Intensify

The US government warns that programmable logic controllers are under threat. Research shows 179 vulnerable devices in operational technology. This poses serious risks to critical infrastructure.

Dark Readingยท