Changeflow GovPing Data Privacy & Cybersecurity Critical Adobe Acrobat Vulnerability, Update Now
Urgent Guidance Added Final

Critical Adobe Acrobat Vulnerability, Update Now

Favicon for www.csa.gov.sg CSA Alerts & Advisories (Singapore)
Published
Detected
Email

Summary

The Cyber Security Agency of Singapore issued an advisory on 13 April 2026 warning of active exploitation of a critical prototype pollution vulnerability (CVE-2026-34621) in Adobe Acrobat and Reader for Windows and macOS. Successful exploitation could allow unauthenticated attackers to perform arbitrary code execution. Users and administrators of affected products on continuous and classic tracks are advised to update to the latest versions immediately.

What changed

CSA Singapore released a security advisory alerting organizations to a critical prototype pollution vulnerability (CVE-2026-34621) in Adobe Acrobat and Reader for Windows and macOS. The vulnerability affects Acrobat DC and Acrobat Reader DC (Continuous Track versions 26.001.21367 and earlier) and Acrobat 2024 (Classic 2024 Track versions 24.001.30356 and earlier). The agency confirms the vulnerability is being exploited in the wild and could allow arbitrary code execution by unauthenticated attackers.

Organizations running affected Adobe products should prioritize patching immediately to the latest versions. IT administrators should verify all endpoints running Acrobat or Reader are updated, particularly those handling sensitive documents. Given active exploitation, this vulnerability poses significant risk and should be treated as urgent by security teams.

What to do next

  1. Update Adobe Acrobat and Reader to the latest versions immediately
  2. Monitor for further updates from Adobe and CSA

Archived snapshot

Apr 13, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Alerts

Active Exploitation of Critical Vulnerability in Adobe Acrobat and Reader

13 April 2026

Adobe has released a security update to address a critical vulnerability in Adobe Acrobat and Reader. Users and administrators of affected products are advised to update to the latest versions immediately.

Background

Adobe has released a security update to address a critical prototype pollution vulnerability (CVE-2026-34621) affecting Adobe Acrobat and Reader for Windows and macOS.

Impact

Successful exploitation of this vulnerability could allow an unauthenticated attacker to perform arbitrary code execution.

Known Exploitation

This vulnerability is reportedly being exploited in the wild.

Affected Products

This vulnerability affects the following Adobe products on Windows and macOS:

  • Acrobat DC (Continuous Track): versions 26.001.21367 and earlier

  • Acrobat Reader DC (Continuous Track): versions 26.001.21367 and earlier

  • Acrobat 2024 (Classic 2024 Track): versions 24.001.30356 and earlier

Mitigation

Users and administrators of affected products are advised to update to the latest versions immediately.

References

https://helpx.adobe.com/security/products/acrobat/apsb26-43.html

https://nvd.nist.gov/vuln/detail/CVE-2026-34621

https://thehackernews.com/2026/04/adobe-patches-actively-exploited.html

Back to top

Get daily alerts for CSA Alerts & Advisories (Singapore)

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CSA.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CSA
Published
April 13th, 2026
Instrument
Guidance
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2026-035/

Who this affects

Applies to
Technology companies Government agencies
Industry sector
5112 Software & Technology
Activity scope
Software patching Vulnerability remediation Endpoint security
Geographic scope
Singapore SG

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy

Get alerts for this source

We'll email you when CSA Alerts & Advisories (Singapore) publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!