Changeflow GovPing Data Privacy & Cybersecurity Adobe Acrobat Use-After-Free Vulnerability CVE-...
Priority review Notice Added Final

Adobe Acrobat Use-After-Free Vulnerability CVE-2020-9715

Email

Summary

CISA added CVE-2020-9715 to the Known Exploited Vulnerabilities (KEV) catalog. The vulnerability is a use-after-free flaw in Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier. Successful exploitation could lead to arbitrary code execution. The SSVC assessment rates exploitation as 'active' with total technical impact.

What changed

CISA added CVE-2020-9715 to the Known Exploited Vulnerabilities catalog, identifying an actively exploited use-after-free vulnerability in Adobe Acrobat and Reader. The vulnerability carries a CVSS 3.1 score of 7.8 (HIGH) with attack vector local, requiring user interaction to exploit.\n\nOrganizations using affected Adobe Acrobat and Reader versions should apply available patches immediately. CISA's SSVC analysis indicates active exploitation with total technical impact, though the attack is not automatable. This KEV addition signals heightened risk and may trigger compliance review for organizations subject to cybersecurity requirements.

What to do next

  1. Apply available patches to affected Adobe Acrobat and Reader versions
  2. Check systems for presence of vulnerable Adobe Acrobat and Reader versions
  3. Prioritize patching given active exploitation status

Archived snapshot

Apr 14, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Required CVE Record Information

CNA: Adobe Systems Incorporated

Description

Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .

Product Status

Learn more Versions 1 Total

Default Status: unknown

affected

  • affected at 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier versions

References 3 Total

CVE Program

Updated:

2024-08-04

This container includes required additional information provided by the CVE Program for this vulnerability.

References 3 Total

Authorized Data Publishers

Learn more

CISA-ADP

Updated:

2026-04-13

SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

SSVC 1 Total

Learn more
| Exploitation | Automatable | Technical Impact | Version | Date Accessed |
| --- | --- | --- | --- | --- |
| active | no | total | 2.0.3 | 2026-04-13 |

KEV 1 Total

Learn more
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-9715 (2026-04-13)

CWE 1 Total

Learn more
- CWE-416: CWE-416 Use After Free

CVSS 1 Total

Learn more
| Score | Severity | Version | Vector String |
| --- | --- | --- | --- |
| 7.8 | HIGH | 3.1 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |

Get daily alerts for CISA Known Exploited Vulnerabilities (KEV)

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CISA.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CISA
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
CVE-2020-9715

Who this affects

Applies to
Technology companies Software publishers Government agencies
Industry sector
5112 Software & Technology
Activity scope
Vulnerability management Patch management Software updates
Geographic scope
United States US

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Software & Technology

Get alerts for this source

We'll email you when CISA Known Exploited Vulnerabilities (KEV) publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!