JPCERT Warns of Critical Vulnerabilities in Adobe Acrobat and Reader Allowing Arbitrary Code Execution
Summary
JPCERT/CC issued alert JPCERT-AT-2026-0006 on 2026-03-11 disclosing critical vulnerabilities in Adobe Acrobat DC, Adobe Acrobat Reader DC, and Adobe Acrobat 2024 Classic that could allow attackers to execute arbitrary code by tricking users into opening malicious PDF content. Affected versions include Adobe Acrobat DC Continuous 25.001.21265 and earlier (Windows, macOS), Adobe Acrobat Reader DC Continuous 25.001.21265 and earlier (Windows, macOS), Adobe Acrobat 2024 Classic 2024 versions 24.001.30307 and earlier (Windows) and 24.001.30308 and earlier (macOS). JPCERT recommends updating to patched versions 25.001.21288, 25.001.21288, and 24.001.30356 respectively.
“Vulnerabilities exists in Adobe Acrobat, a PDF file creation and conversion software, and Adobe Acrobat Reader, a PDF file viewing software.”
About this source
GovPing monitors JPCERT EN alerts alt for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 3 changes logged to date.
What changed
JPCERT/CC published alert JPCERT-AT-2026-0006 on 2026-03-11 disclosing critical arbitrary code execution vulnerabilities in Adobe Acrobat and Adobe Acrobat Reader across multiple versions and platforms. The vulnerabilities affect Adobe Acrobat DC Continuous and Adobe Acrobat Reader DC Continuous versions 25.001.21265 and earlier for Windows and macOS, as well as Adobe Acrobat 2024 Classic 2024 versions 24.001.30307 and earlier (Windows) and 24.001.30308 and earlier (macOS). Organizations and individuals using these Adobe products on Windows or macOS should immediately update to the patched versions: Adobe Acrobat DC Continuous 25.001.21288, Adobe Acrobat Reader DC Continuous 25.001.21288, and Adobe Acrobat 2024 Classic 2024 24.001.30356. Users can update via the product Help menu or by downloading the latest versions from Adobe's official download pages.
What to do next
- Update Adobe products to the latest versions listed in the alert
Archived snapshot
Apr 23, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
- HOME
- Alerts&Advisories
- Alert Regarding Vulnerabilities in Adobe Acrobat and Reader (APSB26-26)
Alert Regarding Vulnerabilities in Adobe Acrobat and Reader (APSB26-26)
last update: 2026-03-11
JPCERT-AT-2026-0006
JPCERT/CC
2026-03-11
I. Overview
Vulnerabilities exists in Adobe Acrobat, a PDF file creation and conversion software, and Adobe Acrobat Reader, a PDF file viewing software. As a result, an attacker may execute arbitrary code by convincing a user to open contents leveraging the vulnerability.For more information, please refer to the Adobe's website.
Adobe Incorporated
Security update available for Adobe Acrobat Reader | APSB26-26
https://helpx.adobe.com/security/products/acrobat/apsb26-26.html
II. Affected Products
Affected products and versions are as follows:
- Adobe Acrobat DC Continuous (25.001.21265) and earlier (Windows, macOS)
- Adobe Acrobat Reader DC Continuous (25.001.21265) and earlier (Windows, macOS)
- Adobe Acrobat 2024 Classic 2024 (24.001.30307) and earlier (Windows)
- Adobe Acrobat 2024 Classic 2024 (24.001.30308) and earlier (macOS)
III. Solution
Please update Adobe products to the latest versions listed below.
- Adobe Acrobat DC Continuous (25.001.21288) (Windows, macOS)
- Adobe Acrobat Reader DC Continuous (25.001.21288) (Windows, macOS)
- Adobe Acrobat 2024 Classic 2024 (24.001.30356) (Windows, macOS)
Acrobat will be updated by starting the product, selecting the menu"Help", and then clicking "Check for Updates". If an update from the menu is not available, please download the latest Adobe Acrobat and Adobe Acrobat Reader from the following URLs. For more information,please refer to the Adobe's website.
Adobe Incorporated
Download Adobe Acrobat
https://helpx.adobe.com/download-install/kb/download-install-acrobat-subscription.html
Adobe Incorporated
Download Acrobat Pro 2024
https://helpx.adobe.com/acrobat/kb/download-acrobat-pro-2024.html
IV. References
Adobe Incorporated
Latest Product Security Updates
https://helpx.adobe.com/security.html
Adobe Incorporated
Update Adobe Acrobat manually
https://helpx.adobe.com/acrobat/kb/install-updates-reader-acrobat.html
If you have any information regarding this alert, please contact JPCERT/CC.
JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/
Yes No
Add comment:
Please use this form to send us your feedback. For more information on the individual products, please contact the developers.
To provide feedback, please enable JavaScript. Thank you. To report an incident, please click here.
Alerts&Advisories
- Security Alerts
- TSUBAME (Internet threat monitoring system)
- TSUBAME Info
- JVN
- About JVN
- Vulnerability Handling and related guidelines
Internet Risk Visualization Service -Mejiro- (Demonstration Test)
What's new2026-03-30
JPCERT/CC Eyes: TSUBAME Report Overflow (Jul-Sep 2025)2026-03-25
JPCERT/CC Eyes: CSIRTs Around the World – Azerbaijan2025-03-25
JPCERT/CC Internet Threat Monitoring Report [October 1, 2025 - December 31, 2025]
Named provisions
Related changes
Get daily alerts for JPCERT EN alerts alt
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from JPCERT.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when JPCERT EN alerts alt publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.