Changeflow GovPing Data Privacy & Cybersecurity Adobe Acrobat and Reader Vulnerability APSB26-4...
Urgent Notice Added Final

Adobe Acrobat and Reader Vulnerability APSB26-43 Allows Arbitrary Code Execution

Favicon for www.jpcert.or.jp Japan JPCERT Advisories
Published
Detected
Email

Summary

JPCERT/CC issued alert JPCERT-AT-2026-0009 on April 13, 2026, advising that Adobe has confirmed active exploitation of a vulnerability (APSB26-43) in Adobe Acrobat and Reader allowing arbitrary code execution. Affected versions include Adobe Acrobat DC Continuous up to 26.001.21367, Adobe Acrobat Reader DC Continuous up to 26.001.21367, and Adobe Acrobat 2024 Classic up to 24.001.30356. Patched versions 26.001.21411 (DC Continuous) and 24.001.30362/24.001.30360 (2024 Classic) are available. JPCERT/CC has not confirmed domestic exploitation at publication but warns that widespread use of these products in Japan creates future risk as vulnerability details become publicly available.

Why this matters

Organizations using Adobe Acrobat or Reader should prioritize this update in their patch management workflow given confirmed active exploitation. IT administrators can verify installed versions under Help > About Adobe Acrobat/Reader and should deploy the patched versions (26.001.21411 for DC Continuous, 24.001.30362/24.001.30360 for 2024 Classic) across managed endpoints as soon as feasible.

AI-drafted from the source document, validated against GovPing's analyst note standards . For the primary regulatory language, read the source document .
Published by JPCERT/CC on jpcert.or.jp . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors Japan JPCERT Advisories for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 3 changes logged to date.

What changed

JPCERT/CC published a security alert regarding Adobe vulnerability APSB26-43, which allows attackers to execute arbitrary code through maliciously crafted PDF files. Adobe has confirmed active exploitation of this vulnerability in the wild. Organizations and individuals using Adobe Acrobat or Adobe Acrobat Reader should immediately verify their current version and apply the available security updates.

The advisory affects all Japanese users of Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Continuous, and Adobe Acrobat 2024 Classic on Windows and macOS platforms. While JPCERT/CC has not confirmed domestic exploitation at publication time, the widespread deployment of these products creates significant risk exposure. Security teams should treat this as a priority update given the confirmed active exploitation and the severity of arbitrary code execution capability.

What to do next

  1. Update Adobe Acrobat and Adobe Acrobat Reader to the latest versions: Adobe Acrobat DC Continuous (26.001.21411), Adobe Acrobat Reader DC Continuous (26.001.21411), Adobe Acrobat 2024 Classic 2024 (24.001.30362 for Windows, 24.001.30360 for macOS)
  2. Check for updates via the Help menu or download the latest versions from Adobe's website

Archived snapshot

Apr 23, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Adobe AcrobatおよびReaderの脆弱性(APSB26-43)に関する注意喚起

最終更新: 2026-04-13
JPCERT-AT-2026-0009
JPCERT/CC
2026-04-13

I. 概要

アドビからPDFファイル作成・変換ソフトウェアAdobe AcrobatおよびPDFファイル閲覧ソフトウェアAdobe Acrobat Readerにおける脆弱性に関する情報(APSB26-43)が公開されました。本脆弱性を悪用されると、攻撃者によって任意のコードが実行される可能性があります。なお、アドビは、本脆弱性の悪用を確認しているとのことです。

アドビ
Security update available for Adobe Acrobat Reader | APSB26-43
https://helpx.adobe.com/security/products/acrobat/apsb26-43.html

JPCERT/CCでは、本情報の公開時点で国内における本脆弱性の悪用を確認していませんが、国内でも広く利用されている製品と考えられることから、今後、脆弱性の詳細などが公表され、脆弱性を悪用する攻撃が広く行われる可能性があります。詳細については、アドビの情報を確認してください。

II. 対象

対象となる製品とバージョンは次のとおりです。

  • Adobe Acrobat DC Continuous(26.001.21367)およびそれ以前(Windows、macOS)
  • Adobe Acrobat Reader DC Continuous(26.001.21367)およびそれ以前(Windows、macOS)
  • Adobe Acrobat 2024 Classic 2024(24.001.30356)およびそれ以前(Windows、macOS)

III. 対策

Adobe AcrobatおよびAdobe Acrobat Readerを次の最新のバージョンに更新してください。

  • Adobe Acrobat DC Continuous(26.001.21411)(Windows、macOS)
  • Adobe Acrobat Reader DC Continuous(26.001.21411)(Windows、macOS)
  • Adobe Acrobat 2024 Classic 2024(24.001.30362)(Windows)
  • Adobe Acrobat 2024 Classic 2024(24.001.30360)(macOS)

更新は、Adobe AcrobatおよびAdobe Acrobat Readerの起動後、メニューの「ヘルプ」から「アップデートの有無をチェック」をクリックすることで実施できます。メニューからの更新が不可能な場合は、以下のURLから最新のAdobe AcrobatおよびAdobe Acrobat Readerをダウンロードしてください。詳細は、アドビの情報をご確認ください。

アドビ
Adobe Acrobat のダウンロード
https://helpx.adobe.com/jp/download-install/kb/download-install-acrobat-subscription.html

アドビ
Acrobat Pro 2024 をダウンロード
https://helpx.adobe.com/jp/acrobat/kb/download-acrobat-classic.html

IV. 参考情報

アドビ
Latest Product Security Updates
https://helpx.adobe.com/security.html

アドビ
Adobe Acrobat を手動で更新する
https://helpx.adobe.com/jp/acrobat/kb/install-updates-reader-acrobat.html

今回の件につきまして提供いただける情報がございましたら、JPCERT/CCまでご連絡ください。

一般社団法人JPCERTコーディネーションセンター(JPCERT/CC)
サイバーセキュリティコーディネーショングループ
Email:ew-info@jpcert.or.jp

このページは役に立ちましたか?

はい いいえ

その他、ご意見・ご感想などございましたら、ご記入ください。

こちらはご意見・ご感想用のフォームです。各社製品については、各社へお問い合わせください。

※本フォームにいただいたコメントへの返信はできません。 返信をご希望の方は「お問合せ」 をご利用ください。

javascriptを有効にすると、ご回答いただけます。 ありがとうございました。 インシデント報告はこちらから

緊急情報を確認する

Get daily alerts for Japan JPCERT Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from JPCERT/CC.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
JPCERT/CC
Published
April 13th, 2026
Instrument
Notice
Branch
Executive
Source language
ja
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies Consumers
Industry sector
5112 Software & Technology
Activity scope
Software vulnerability remediation Patch management
Geographic scope
Japan JP

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Product Safety

Get alerts for this source

We'll email you when Japan JPCERT Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!