Cyber Posture

CVE-2026-34621

HighCISA KEVActive Exploitation

Published: 11 April 2026

Published
11 April 2026
Modified
13 April 2026
KEV Added
13 April 2026
Patch
CVSS Score 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0959 92.9th percentile
Risk Priority 43 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user opening a malicious file in order to gain execution.

Security Summary

CVE-2026-34621 is an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability, mapped to CWE-1321, affecting Adobe Acrobat Reader versions 24.001.30356, 26.001.21367, and earlier. Published on 2026-04-11, this flaw could result in arbitrary code execution in the context of the current user.

Exploitation requires user interaction, as a victim must open a malicious file. An attacker who can trick a user into opening such a file—typically via social engineering or phishing—can achieve arbitrary code execution with the privileges of the current user. The CVSS v3.1 base score of 8.6 (AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H) reflects a local attack vector, low attack complexity, no required privileges, user interaction dependency, changed scope, and high impacts on confidentiality, integrity, and availability.

Adobe Security Bulletin APSB26-43 details the issue and mitigation: https://helpx.adobe.com/security/products/acrobat/apsb26-43.html. The vulnerability is also listed in CISA's Known Exploited Vulnerabilities Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-34621, indicating active exploitation in the wild.

Details

CWE(s)
CWE-1321
KEV Date Added
13 April 2026

Affected Products

adobe
acrobat dc
≤ 26.001.21411
adobe
acrobat reader dc
≤ 26.001.21411
adobe
acrobat
24.0.0 — 24.001.30362 · 24.0.0 — 24.001.30360

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Prototype pollution vulnerability in Adobe Acrobat Reader enables arbitrary code execution via client software exploitation (T1203) when user opens malicious file (T1204.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References