Cyber Posture

CVE-2025-27174

High

Published: 11 March 2025

Published
11 March 2025
Modified
28 April 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0013 32.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user opening a malicious file in order to gain execution.

Security Summary

CVE-2025-27174 is a Use After Free (CWE-416) vulnerability affecting Adobe Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428, and earlier. This flaw occurs during file processing and can lead to arbitrary code execution in the context of the current user. The vulnerability has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high impact with low attack complexity but requiring local access and user interaction.

Exploitation requires an attacker to deliver a malicious PDF file to a victim, who must then open it in a vulnerable version of Acrobat Reader. No special privileges are needed (PR:N), making it accessible to any local attacker with the ability to entice user interaction, such as through phishing or social engineering. Successful exploitation allows arbitrary code execution, potentially granting the attacker high confidentiality, integrity, and availability impacts within the user's session.

Adobe Security Bulletin APSB25-14, available at https://helpx.adobe.com/security/products/acrobat/apsb25-14.html, details patches for affected versions and recommends updating to the latest release to mitigate the issue.

Details

CWE(s)
CWE-416

Affected Products

adobe
acrobat
20.001.30002 — 20.005.30763 · 24.0.0 — 24.001.30235
adobe
acrobat dc
15.008.20082 — 25.001.20432
adobe
acrobat reader
20.001.30002 — 20.005.30763
adobe
acrobat reader dc
15.008.20082 — 25.001.20432

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Use-after-free in PDF processing enables arbitrary code execution upon opening a malicious file in Acrobat Reader, directly mapping to client-side exploitation and user execution of malicious files.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References