Cyber Posture

CVE-2025-27160

High

Published: 11 March 2025

Published
11 March 2025
Modified
28 April 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0013 32.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user opening a malicious file in order to gain execution.

Security Summary

CVE-2025-27160 is a Use After Free vulnerability (CWE-416) affecting Adobe Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428, and earlier. Published on 2025-03-11, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and can result in arbitrary code execution in the context of the current user.

The vulnerability can be exploited by an attacker who tricks a victim into opening a malicious file locally, such as a specially crafted PDF. No special privileges are required (PR:N), and the attack has low complexity (AC:L), but it demands user interaction (UI:R). Successful exploitation allows the attacker to execute arbitrary code with the victim's user privileges, potentially leading to high confidentiality, integrity, and availability impacts without changing scope.

Adobe Security Bulletin APSB25-14, available at https://helpx.adobe.com/security/products/acrobat/apsb25-14.html, provides details on the issue and recommended mitigations, including patches for affected versions.

Details

CWE(s)
CWE-416

Affected Products

adobe
acrobat
20.001.30002 — 20.005.30763 · 24.0.0 — 24.001.30235
adobe
acrobat dc
15.008.20082 — 25.001.20432
adobe
acrobat reader
20.001.30002 — 20.005.30763
adobe
acrobat reader dc
15.008.20082 — 25.001.20432

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Use-after-free in Adobe Acrobat Reader allows arbitrary code execution when user opens malicious PDF file, directly enabling client-side exploitation (T1203) and user execution of malicious file (T1204.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References