Adobe Acrobat and Reader Vulnerabilities Allow Code Execution
Summary
JPCERT/CC issued alert JPCERT-AT-2026-0011 on April 15, 2026, notifying that vulnerabilities exist in Adobe Acrobat and Adobe Acrobat Reader affecting multiple versions on Windows and macOS. Affected versions include Adobe Acrobat DC Continuous (26.001.21411) and earlier, and Adobe Acrobat 2024 Classic (24.001.30362 and earlier on Windows; 24.001.30360 and earlier on macOS). An attacker may execute arbitrary code by convincing a user to open malicious content leveraging the vulnerability. Users are advised to update to the latest versions: Adobe Acrobat DC Continuous (26.001.21431) or Adobe Acrobat 2024 Classic (24.001.30365).
“Vulnerabilities exists in Adobe Acrobat, a PDF file creation and conversion software, and Adobe Acrobat Reader, a PDF file viewing software.”
Organizations using Adobe Acrobat or Reader should verify current installed versions across their environment and deploy the patched versions (26.001.21431 or 24.001.30365) as soon as practicable. Given the code execution vector achievable through malicious PDFs, email gateway and sandboxing controls should be reviewed for PDF inspection coverage.
About this source
GovPing monitors JPCERT EN alerts alt for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 3 changes logged to date.
What changed
JPCERT/CC published alert JPCERT-AT-2026-0011 disclosing vulnerabilities in Adobe Acrobat and Adobe Acrobat Reader that could allow remote code execution. The alert identifies affected versions across Windows and macOS platforms including Acrobat DC Continuous builds up to 26.001.21411 and Acrobat 2024 Classic builds up to 24.001.30362 (Windows) and 24.001.30360 (macOS).
Organizations and users running affected versions of Adobe Acrobat or Reader should immediately update to the patched versions (26.001.21431 for DC Continuous; 24.001.30365 for Acrobat 2024 Classic) via the Help menu's Check for Updates function or by downloading from Adobe's website. IT administrators managing enterprise deployments should prioritize patching given the code execution risk from malicious PDF files.
What to do next
- Update Adobe products to the latest versions: Adobe Acrobat DC Continuous (26.001.21431), Adobe Acrobat Reader DC Continuous (26.001.21431), and Adobe Acrobat 2024 Classic (24.001.30365)
Archived snapshot
Apr 23, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
- HOME
- Alerts&Advisories
- Alert Regarding Vulnerabilities in Adobe Acrobat and Reader (APSB26-44)
Alert Regarding Vulnerabilities in Adobe Acrobat and Reader (APSB26-44)
last update: 2026-04-15
JPCERT-AT-2026-0011
JPCERT/CC
2026-04-15
I. Overview
Vulnerabilities exists in Adobe Acrobat, a PDF file creation and conversion software, and Adobe Acrobat Reader, a PDF file viewing software. As a result, an attacker may execute arbitrary code by convincing a user to open contents leveraging the vulnerability. For more information, please refer to the Adobe's website.
Adobe Incorporated
Security update available for Adobe Acrobat Reader | APSB26-44
https://helpx.adobe.com/security/products/acrobat/apsb26-44.html
II. Affected Products
Affected products and versions are as follows:
- Adobe Acrobat DC Continuous (26.001.21411) and earlier (Windows, macOS)
- Adobe Acrobat Reader DC Continuous (26.001.21411) and earlier (Windows, macOS)
- Adobe Acrobat 2024 Classic 2024 (24.001.30362) and earlier (Windows)
- Adobe Acrobat 2024 Classic 2024 (24.001.30360) and earlier (macOS)
III. Solution
Please update Adobe products to the latest versions listed below.
- Adobe Acrobat DC Continuous (26.001.21431) (Windows, macOS)
- Adobe Acrobat Reader DC Continuous (26.001.21431) (Windows, macOS)
- Adobe Acrobat 2024 Classic 2024 (24.001.30365) (Windows, macOS)
Acrobat will be updated by starting the product, selecting the menu "Help", and then clicking "Check for Updates". If an update from the menu is not available, please download the latest Adobe Acrobat and Adobe Acrobat Reader from the following URLs. For more information, please refer to the Adobe's website.
Adobe Incorporated
Download Adobe Acrobat
https://helpx.adobe.com/download-install/kb/download-install-acrobat-subscription.html
Adobe Incorporated
Download Acrobat Pro 2024
https://helpx.adobe.com/acrobat/kb/download-acrobat-pro-2024.html
IV. References
Adobe Incorporated
Latest Product Security Updates
https://helpx.adobe.com/security.html
Adobe Incorporated
Update Adobe Acrobat manually
https://helpx.adobe.com/acrobat/kb/install-updates-reader-acrobat.html
If you have any information regarding this alert, please contact JPCERT/CC.
JPCERT Coordination Center (Cyber Security Coordination Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/
Yes No
Add comment:
Please use this form to send us your feedback. For more information on the individual products, please contact the developers.
To provide feedback, please enable JavaScript. Thank you. To report an incident, please click here.
Alerts&Advisories
- Security Alerts
- TSUBAME (Internet threat monitoring system)
- TSUBAME Info
- JVN
- About JVN
- Vulnerability Handling and related guidelines
Internet Risk Visualization Service -Mejiro- (Demonstration Test)
What's new2026-03-30
JPCERT/CC Eyes: TSUBAME Report Overflow (Jul-Sep 2025)2026-03-25
JPCERT/CC Eyes: CSIRTs Around the World – Azerbaijan2025-03-25
JPCERT/CC Internet Threat Monitoring Report [October 1, 2025 - December 31, 2025]
Parties
Related changes
Get daily alerts for JPCERT EN alerts alt
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from JPCERT.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when JPCERT EN alerts alt publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.