Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security

Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security

Adobe Acrobat Reader Vulnerabilities

Critical security updates for Acrobat and Reader are available, addressing multiple vulnerabilities that could allow attackers to execute arbitrary code and bypass essential security features.

Adobe issued security bulletin APSB25-119 on December 9, 2025, with a priority rating of 3, affecting both Windows and macOS platforms. The vulnerabilities stem from multiple weaknesses in the PDF processing engine.

Vulnerability Category Impact Severity CVSS Score CVE
Untrusted Search Path CWE-426 Arbitrary code execution Critical 7.8 CVE-2025-64785
Out-of-bounds Read CWE-125 Arbitrary code execution Critical 7.8 CVE-2025-64899
Improper Verification of Cryptographic Signature CWE-347 Security feature bypass Moderate 3.3 CVE-2025-64786
Improper Verification of Cryptographic Signature CWE-347 Security feature bypass Moderate 3.3 CVE-2025-64787

How Attackers Could Exploit the Flaws

Two critical flaws enable arbitrary code execution through untrusted search path vulnerabilities and out-of-bounds read errors. These issues carry a CVSS base score of 7.8, indicating severe risk to users.

Two additional moderate vulnerabilities related to improper verification of cryptographic signatures could allow attackers to bypass security features, each with a CVSS score of 3.3.

The affected products include Acrobat DC, Acrobat Reader DC, Acrobat 2024, Acrobat 2020, and Acrobat Reader 2020 across all current versions.

Product Track Affected Versions Platform
Acrobat DC Continuous 25.001.20982 and earlier Windows & macOS
Acrobat Reader DC Continuous 25.001.20982 and earlier Windows & macOS
Acrobat 2024 Classic 2024 Win – 24.001.30264 and earlier; Mac – 24.001.30273 and earlier Windows & macOS
Acrobat 2020 Classic 2020 Win – 20.005.30793 and earlier; Mac – 20.005.30803 and earlier Windows & macOS
Acrobat Reader 2020 Classic 2020 Win – 20.005.30793 and earlier; Mac – 20.005.30803 and earlier Windows & macOS

Adobe recommends installing the latest versions immediately. Users can update manually through Help > Check for Updates, or allow automatic updates to install security patches without intervention.

google

The updated versions include Acrobat DC and Reader DC 25.001.20997, Acrobat 2024 versions 24.001.30307 (Windows) and 24.001.30308 (macOS), and Acrobat 2020 versions 20.005.30838 across both platforms.

IT administrators should deploy updates using their preferred method, such as AIP-GPO, bootstrapper, or SCCM, for Windows environments.

Currently, Adobe reports no known exploits targeting these vulnerabilities in the wild. However, the critical nature of the flaws and their potential for remote execution make prompt patching essential.

Organizations should prioritize updating all affected Acrobat installations to prevent potential compromise.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link