Changeflow GovPing Data Privacy & Cybersecurity Adobe Acrobat and Reader Vulnerabilities Allow ...
Priority review Notice Added Final

Adobe Acrobat and Reader Vulnerabilities Allow Code Execution

Favicon for www.jpcert.or.jp JPCERT EN alerts alt
Published
Detected
Email

Summary

JPCERT/CC issued alert JPCERT-AT-2026-0011 on April 15, 2026, notifying that vulnerabilities exist in Adobe Acrobat and Adobe Acrobat Reader affecting multiple versions on Windows and macOS. Affected versions include Adobe Acrobat DC Continuous (26.001.21411) and earlier, and Adobe Acrobat 2024 Classic (24.001.30362 and earlier on Windows; 24.001.30360 and earlier on macOS). An attacker may execute arbitrary code by convincing a user to open malicious content leveraging the vulnerability. Users are advised to update to the latest versions: Adobe Acrobat DC Continuous (26.001.21431) or Adobe Acrobat 2024 Classic (24.001.30365).

“Vulnerabilities exists in Adobe Acrobat, a PDF file creation and conversion software, and Adobe Acrobat Reader, a PDF file viewing software.”

JPCERT , verbatim from source
Why this matters

Organizations using Adobe Acrobat or Reader should verify current installed versions across their environment and deploy the patched versions (26.001.21431 or 24.001.30365) as soon as practicable. Given the code execution vector achievable through malicious PDFs, email gateway and sandboxing controls should be reviewed for PDF inspection coverage.

AI-drafted from the source document, validated against GovPing's analyst note standards . For the primary regulatory language, read the source document .
Published by JPCERT on jpcert.or.jp . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors JPCERT EN alerts alt for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 3 changes logged to date.

What changed

JPCERT/CC published alert JPCERT-AT-2026-0011 disclosing vulnerabilities in Adobe Acrobat and Adobe Acrobat Reader that could allow remote code execution. The alert identifies affected versions across Windows and macOS platforms including Acrobat DC Continuous builds up to 26.001.21411 and Acrobat 2024 Classic builds up to 24.001.30362 (Windows) and 24.001.30360 (macOS).

Organizations and users running affected versions of Adobe Acrobat or Reader should immediately update to the patched versions (26.001.21431 for DC Continuous; 24.001.30365 for Acrobat 2024 Classic) via the Help menu's Check for Updates function or by downloading from Adobe's website. IT administrators managing enterprise deployments should prioritize patching given the code execution risk from malicious PDF files.

What to do next

  1. Update Adobe products to the latest versions: Adobe Acrobat DC Continuous (26.001.21431), Adobe Acrobat Reader DC Continuous (26.001.21431), and Adobe Acrobat 2024 Classic (24.001.30365)

Archived snapshot

Apr 23, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Alert Regarding Vulnerabilities in Adobe Acrobat and Reader (APSB26-44)

last update: 2026-04-15
JPCERT-AT-2026-0011
JPCERT/CC
2026-04-15

I. Overview

Vulnerabilities exists in Adobe Acrobat, a PDF file creation and conversion software, and Adobe Acrobat Reader, a PDF file viewing software. As a result, an attacker may execute arbitrary code by convincing a user to open contents leveraging the vulnerability. For more information, please refer to the Adobe's website.

Adobe Incorporated
Security update available for Adobe Acrobat Reader | APSB26-44
https://helpx.adobe.com/security/products/acrobat/apsb26-44.html

II. Affected Products

Affected products and versions are as follows:

  • Adobe Acrobat DC Continuous (26.001.21411) and earlier (Windows, macOS)
  • Adobe Acrobat Reader DC Continuous (26.001.21411) and earlier (Windows, macOS)
  • Adobe Acrobat 2024 Classic 2024 (24.001.30362) and earlier (Windows)
  • Adobe Acrobat 2024 Classic 2024 (24.001.30360) and earlier (macOS)

III. Solution

Please update Adobe products to the latest versions listed below.

  • Adobe Acrobat DC Continuous (26.001.21431) (Windows, macOS)
  • Adobe Acrobat Reader DC Continuous (26.001.21431) (Windows, macOS)
  • Adobe Acrobat 2024 Classic 2024 (24.001.30365) (Windows, macOS)

Acrobat will be updated by starting the product, selecting the menu "Help", and then clicking "Check for Updates". If an update from the menu is not available, please download the latest Adobe Acrobat and Adobe Acrobat Reader from the following URLs. For more information, please refer to the Adobe's website.

Adobe Incorporated
Download Adobe Acrobat
https://helpx.adobe.com/download-install/kb/download-install-acrobat-subscription.html

Adobe Incorporated
Download Acrobat Pro 2024
https://helpx.adobe.com/acrobat/kb/download-acrobat-pro-2024.html

IV. References

Adobe Incorporated
Latest Product Security Updates
https://helpx.adobe.com/security.html

Adobe Incorporated
Update Adobe Acrobat manually
https://helpx.adobe.com/acrobat/kb/install-updates-reader-acrobat.html

If you have any information regarding this alert, please contact JPCERT/CC.

JPCERT Coordination Center (Cyber Security Coordination Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/

Was this helpful?

Yes No

Add comment:

Please use this form to send us your feedback. For more information on the individual products, please contact the developers.

To provide feedback, please enable JavaScript. Thank you. To report an incident, please click here.

Alerts&Advisories

Get daily alerts for JPCERT EN alerts alt

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from JPCERT.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
JPCERT
Published
April 15th, 2026
Instrument
Notice
Branch
Executive
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies Consumers
Industry sector
5112 Software & Technology
Activity scope
Security vulnerability patching PDF software updates
Geographic scope
Japan JP

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Product Safety Data Privacy

Get alerts for this source

We'll email you when JPCERT EN alerts alt publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!