6 min read
By: RedLegg's Cyber Threat Intelligence Team
About:
CVE-2026-34621 is a high-severity vulnerability in Adobe Acrobat and Acrobat Reader caused by improper control of object prototype attributes. The flaw allows attackers to manipulate how objects are handled within the application, potentially leading to arbitrary code execution.
An attacker can exploit this vulnerability by delivering a specially crafted malicious file and convincing a user to open it. Once triggered, the attacker-controlled code executes in the context of the current user, potentially enabling system compromise.
This vulnerability is confirmed to be actively exploited in the wild.
RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.
VULNERABILITIES
Remote Code Execution Vulnerability in Adobe Acrobat and Acrobat Reader
Identifier: CVE-2026-34621
CVSS Score: 8.6 (High, CVSS v3.1)
PoC or Exploitation:
Adobe has confirmed that CVE-2026-34621 is being actively exploited in the wild.
Update/ Patch:
- Acrobat DC 26.001.21367 and earlier
- Acrobat Reader DC 26.001.21367 and earlier
- Acrobat 2024 version 24.001.30356 and earlier
- Acrobat DC 26.001.21411
- Acrobat Reader DC 26.001.21411
- Acrobat 2024 version 24.001.30362 for Windows
- Acrobat 2024 version 24.001.30360 for macOS
Mitigation Recommendation: