HomeIntelligenceBrief
VULNERABILITY BRIEF🔴 Critical Vulnerability

Zero‑Day in Adobe Acrobat Reader Actively Exploited via Malicious PDFs Since December 2025

Attackers have been weaponising a newly discovered zero‑day in Adobe Acrobat Reader for months, delivering malicious PDFs that steal local files and can lead to remote‑code execution. The flaw affects any organisation that relies on the reader, creating urgent third‑party risk concerns until a patch is released.

LiveThreat™ Intelligence · 📅 April 09, 2026· 📰 bleepingcomputer.com
🔴
Severity
Critical
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
4 recommended
📰
Source
bleepingcomputer.com

Zero‑Day in Adobe Acrobat Reader Actively Exploited via Malicious PDFs Since December 2025

What Happened — A previously unknown vulnerability in Adobe Acrobat Reader is being weaponised in the wild. Attackers distribute specially‑crafted PDF files that trigger the flaw as soon as the document is opened, allowing data theft through Acrobat APIs and paving the way for remote‑code execution.

Why It Matters for TPRM

  • Third‑party endpoints that process PDFs become a direct foothold for threat actors.
  • Compromise of a widely‑deployed client application can cascade into downstream supply‑chain risk for vendors that embed PDFs in reports, invoices, or contracts.
  • No patch is currently available, leaving organisations reliant on mitigations and heightened monitoring.

Who Is Affected — Enterprises across all sectors that rely on Adobe Reader for document handling, notably Technology / SaaS, Financial Services, Healthcare, and Government agencies.

Recommended Actions

  • Enforce strict PDF handling policies: block PDFs from unknown senders and sandbox them before opening.
  • Deploy network detection for the “Adobe Synchronizer” User‑Agent string and block associated traffic.
  • Accelerate patch management once Adobe releases an update; in the interim, apply application‑level mitigations (e.g., disable vulnerable Acrobat APIs via configuration).
  • Review third‑party contracts that require PDF exchange and verify that vendors have comparable controls.

Technical Notes — The exploit leverages a zero‑day vulnerability in the latest Adobe Reader version, requires only the opening of a PDF (no macro or additional user interaction), and abuses the util.readFileIntoStream and RSS.addFeed APIs to harvest local files. Threat actors embed Russian‑language lures tied to the oil‑and‑gas sector, suggesting a targeted espionage motive. Monitoring for the “Adobe Synchronizer” string in HTTP/HTTPS headers is an effective early‑warning measure. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.