Changeflow GovPing Data Privacy & Cybersecurity Adobe Acrobat Reader Remote Code Execution Vuln...
Priority review Notice Added Final

Adobe Acrobat Reader Remote Code Execution Vulnerability CVE-2026-1047

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund issued a critical security advisory for Adobe Acrobat Reader vulnerability CVE-2026-1047 with CVSS Base Score of 9.6. The flaw allows remote, unauthenticated attackers to execute arbitrary code and gain full administrative control of affected systems running Windows, UNIX, and other operating systems. Adobe Acrobat Reader versions up to and including 26.001.21367 are affected.

What changed

CERT-Bund published a critical security advisory identifying a remote code execution vulnerability in Adobe Acrobat Reader affecting versions up to 26.001.21367. The vulnerability allows an unauthenticated remote attacker to disclose confidential information and execute arbitrary code, potentially achieving full system compromise with administrative privileges.

Organizations using Adobe Acrobat Reader on Windows, UNIX, or other platforms must prioritize immediate patching to the latest secure version. Security teams should implement defense-in-depth controls including email/web filtering for PDF attachments, network segmentation, and continuous monitoring for exploitation attempts. Failure to remediate exposes systems to remote takeover and data exfiltration risks.

What to do next

  1. Apply Adobe security patches for Acrobat Reader immediately
  2. Implement network-level controls to block malicious PDF delivery
  3. Monitor for indicators of exploitation and apply workarounds if patches unavailable

Archived snapshot

Apr 10, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-1047] Adobe Acrobat Reader: Schwachstelle ermöglicht Erlangen von Administratorrechten CVSS Base Score 9.6 (kritisch) CVSS Temporal Score 9.6 (kritisch) Remoteangriff ja Datum 09.04.2026 Stand 10.04.2026 Mitigation nein

Betroffene Systeme

Betriebssystem

  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Adobe Reader ist ein Programm für die Anzeige von Dokumenten im Portable Document Format (PDF).

Produkte

09.04.2026
- Adobe Acrobat Reader <=26.001.21367

Angriff

Angriff

Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Adobe Acrobat Reader ausnutzen, um vertrauliche Informationen offenzulegen und beliebigen Code auszuführen, was zu einer vollständigen Kompromittierung des Systems führen könnte. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
April 9th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-1047

Who this affects

Applies to
Technology companies Government agencies Manufacturers
Industry sector
5112 Software & Technology
Activity scope
Software vulnerability remediation Security patch deployment Remote code execution prevention
Threshold
Adobe Acrobat Reader <=26.001.21367
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Software & Technology Consumer Protection

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!