Cyber Posture

CVE-2025-27158

High

Published: 11 March 2025

Published
11 March 2025
Modified
28 April 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0019 41.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user opening a malicious file in order to gain execution.

Security Summary

CVE-2025-27158 is an Access of Uninitialized Pointer vulnerability (CWE-824) affecting Adobe Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428, and earlier. The flaw enables arbitrary code execution in the context of the current user. It carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and was published on 2025-03-11.

Exploitation requires user interaction, as a victim must open a malicious file processed by the affected Acrobat Reader. An attacker with no privileges can deliver such a file through common vectors like email attachments or downloads, tricking the user into opening it to trigger the vulnerability and achieve arbitrary code execution under the current user's context.

Adobe Security Bulletin APSB25-14 and Talos Intelligence report TALOS-2025-2135 detail the issue and mitigation steps, including available patches for Acrobat Reader.

Details

CWE(s)
CWE-824

Affected Products

adobe
acrobat
20.001.30002 — 20.005.30763 · 24.0.0 — 24.001.30235
adobe
acrobat dc
15.008.20082 — 25.001.20432
adobe
acrobat reader
20.001.30002 — 20.005.30763
adobe
acrobat reader dc
15.008.20082 — 25.001.20432

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

The vulnerability is a memory corruption flaw in Adobe Acrobat Reader that enables arbitrary code execution when a user opens a malicious file (e.g., PDF), directly mapping to Exploitation for Client Execution (T1203) and User Execution via Malicious File (T1204.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References