Critical Adobe Acrobat Vulnerability, Update Now
Summary
The Cyber Security Agency of Singapore issued an advisory on 13 April 2026 warning of active exploitation of a critical prototype pollution vulnerability (CVE-2026-34621) in Adobe Acrobat and Reader for Windows and macOS. Successful exploitation could allow unauthenticated attackers to perform arbitrary code execution. Users and administrators of affected products on continuous and classic tracks are advised to update to the latest versions immediately.
What changed
CSA Singapore released a security advisory alerting organizations to a critical prototype pollution vulnerability (CVE-2026-34621) in Adobe Acrobat and Reader for Windows and macOS. The vulnerability affects Acrobat DC and Acrobat Reader DC (Continuous Track versions 26.001.21367 and earlier) and Acrobat 2024 (Classic 2024 Track versions 24.001.30356 and earlier). The agency confirms the vulnerability is being exploited in the wild and could allow arbitrary code execution by unauthenticated attackers.
Organizations running affected Adobe products should prioritize patching immediately to the latest versions. IT administrators should verify all endpoints running Acrobat or Reader are updated, particularly those handling sensitive documents. Given active exploitation, this vulnerability poses significant risk and should be treated as urgent by security teams.
What to do next
- Update Adobe Acrobat and Reader to the latest versions immediately
- Monitor for further updates from Adobe and CSA
Archived snapshot
Apr 13, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Alerts
Active Exploitation of Critical Vulnerability in Adobe Acrobat and Reader
13 April 2026
Adobe has released a security update to address a critical vulnerability in Adobe Acrobat and Reader. Users and administrators of affected products are advised to update to the latest versions immediately.
Background
Adobe has released a security update to address a critical prototype pollution vulnerability (CVE-2026-34621) affecting Adobe Acrobat and Reader for Windows and macOS.
Impact
Successful exploitation of this vulnerability could allow an unauthenticated attacker to perform arbitrary code execution.
Known Exploitation
This vulnerability is reportedly being exploited in the wild.
Affected Products
This vulnerability affects the following Adobe products on Windows and macOS:
Acrobat DC (Continuous Track): versions 26.001.21367 and earlier
Acrobat Reader DC (Continuous Track): versions 26.001.21367 and earlier
Acrobat 2024 (Classic 2024 Track): versions 24.001.30356 and earlier
Mitigation
Users and administrators of affected products are advised to update to the latest versions immediately.
References
https://helpx.adobe.com/security/products/acrobat/apsb26-43.html
https://nvd.nist.gov/vuln/detail/CVE-2026-34621
https://thehackernews.com/2026/04/adobe-patches-actively-exploited.html
Related changes
Get daily alerts for CSA Alerts & Advisories (Singapore)
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CSA.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CSA Alerts & Advisories (Singapore) publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.