Changeflow GovPing Data Privacy & Cybersecurity JPCERT Warns of Critical Vulnerabilities in Ado...
Priority review Notice Added Final

JPCERT Warns of Critical Vulnerabilities in Adobe Acrobat and Reader Allowing Arbitrary Code Execution

Favicon for www.jpcert.or.jp JPCERT EN alerts alt
Published
Detected
Email

Summary

JPCERT/CC issued alert JPCERT-AT-2026-0006 on 2026-03-11 disclosing critical vulnerabilities in Adobe Acrobat DC, Adobe Acrobat Reader DC, and Adobe Acrobat 2024 Classic that could allow attackers to execute arbitrary code by tricking users into opening malicious PDF content. Affected versions include Adobe Acrobat DC Continuous 25.001.21265 and earlier (Windows, macOS), Adobe Acrobat Reader DC Continuous 25.001.21265 and earlier (Windows, macOS), Adobe Acrobat 2024 Classic 2024 versions 24.001.30307 and earlier (Windows) and 24.001.30308 and earlier (macOS). JPCERT recommends updating to patched versions 25.001.21288, 25.001.21288, and 24.001.30356 respectively.

“Vulnerabilities exists in Adobe Acrobat, a PDF file creation and conversion software, and Adobe Acrobat Reader, a PDF file viewing software.”

JPCERT , verbatim from source
Published by JPCERT on jpcert.or.jp . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors JPCERT EN alerts alt for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 3 changes logged to date.

What changed

JPCERT/CC published alert JPCERT-AT-2026-0006 on 2026-03-11 disclosing critical arbitrary code execution vulnerabilities in Adobe Acrobat and Adobe Acrobat Reader across multiple versions and platforms. The vulnerabilities affect Adobe Acrobat DC Continuous and Adobe Acrobat Reader DC Continuous versions 25.001.21265 and earlier for Windows and macOS, as well as Adobe Acrobat 2024 Classic 2024 versions 24.001.30307 and earlier (Windows) and 24.001.30308 and earlier (macOS). Organizations and individuals using these Adobe products on Windows or macOS should immediately update to the patched versions: Adobe Acrobat DC Continuous 25.001.21288, Adobe Acrobat Reader DC Continuous 25.001.21288, and Adobe Acrobat 2024 Classic 2024 24.001.30356. Users can update via the product Help menu or by downloading the latest versions from Adobe's official download pages.

What to do next

  1. Update Adobe products to the latest versions listed in the alert

Archived snapshot

Apr 23, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Alert Regarding Vulnerabilities in Adobe Acrobat and Reader (APSB26-26)

last update: 2026-03-11
JPCERT-AT-2026-0006
JPCERT/CC
2026-03-11

I. Overview

Vulnerabilities exists in Adobe Acrobat, a PDF file creation and conversion software, and Adobe Acrobat Reader, a PDF file viewing software. As a result, an attacker may execute arbitrary code by convincing a user to open contents leveraging the vulnerability.For more information, please refer to the Adobe's website.

Adobe Incorporated
Security update available for Adobe Acrobat Reader | APSB26-26
https://helpx.adobe.com/security/products/acrobat/apsb26-26.html

II. Affected Products

Affected products and versions are as follows:

  • Adobe Acrobat DC Continuous (25.001.21265) and earlier (Windows, macOS)
  • Adobe Acrobat Reader DC Continuous (25.001.21265) and earlier (Windows, macOS)
  • Adobe Acrobat 2024 Classic 2024 (24.001.30307) and earlier (Windows)
  • Adobe Acrobat 2024 Classic 2024 (24.001.30308) and earlier (macOS)

III. Solution

Please update Adobe products to the latest versions listed below.

  • Adobe Acrobat DC Continuous (25.001.21288) (Windows, macOS)
  • Adobe Acrobat Reader DC Continuous (25.001.21288) (Windows, macOS)
  • Adobe Acrobat 2024 Classic 2024 (24.001.30356) (Windows, macOS)

Acrobat will be updated by starting the product, selecting the menu"Help", and then clicking "Check for Updates". If an update from the menu is not available, please download the latest Adobe Acrobat and Adobe Acrobat Reader from the following URLs. For more information,please refer to the Adobe's website.

Adobe Incorporated
Download Adobe Acrobat
https://helpx.adobe.com/download-install/kb/download-install-acrobat-subscription.html

Adobe Incorporated
Download Acrobat Pro 2024
https://helpx.adobe.com/acrobat/kb/download-acrobat-pro-2024.html

IV. References

Adobe Incorporated
Latest Product Security Updates
https://helpx.adobe.com/security.html

Adobe Incorporated
Update Adobe Acrobat manually
https://helpx.adobe.com/acrobat/kb/install-updates-reader-acrobat.html

If you have any information regarding this alert, please contact JPCERT/CC.

JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/

Was this helpful?

Yes No

Add comment:

Please use this form to send us your feedback. For more information on the individual products, please contact the developers.

To provide feedback, please enable JavaScript. Thank you. To report an incident, please click here.

Alerts&Advisories

Named provisions

I. Overview II. Affected Products III. Solution IV. References

Get daily alerts for JPCERT EN alerts alt

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from JPCERT.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
JPCERT
Published
March 11th, 2026
Instrument
Notice
Branch
Executive
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
JPCERT-AT-2026-0006

Who this affects

Applies to
Technology companies Manufacturers Government agencies
Industry sector
5112 Software & Technology
Activity scope
Security vulnerability disclosure Software patching
Geographic scope
Japan JP

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Consumer Protection

Get alerts for this source

We'll email you when JPCERT EN alerts alt publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!