Cyber Security News

Adobe Acrobat Reader Vulnerabilities Let Attackers Execute Arbitrary Code

Three significant vulnerabilities in Adobe Acrobat Reader were found, which might allow attackers to run arbitrary code or expose sensitive information.

These vulnerabilities, discovered by Cisco Talos, affect multiple versions of the popular PDF software and pose significant security risks to users who unwittingly open maliciously crafted PDF files.

Memory Corruption Vulnerability (CVE-2025-27158)

CVE-2025-27158 is a high-severity memory corruption vulnerability resulting from an uninitialized pointer in Adobe Acrobat Reader’s font handling functionality.

This flaw carries a CVSS 3.1 score of 8.8, making it particularly dangerous. This vulnerability could allow attackers to execute arbitrary code on the victim’s system when exploited.

The attack vector requires a specially crafted font file embedded in a PDF document, which triggers the exploitation when opened by an unsuspecting user.

The vulnerability has been classified under CWE-824 (Access of Uninitialized Pointer) and affects Adobe Acrobat Reader 2024.005.20320 and potentially earlier versions. 

The primary concern with this vulnerability is that successful exploitation would allow attackers to run malicious code within the context of the user’s application, potentially granting them access to sensitive information or further system compromise.

Risk FactorsDetails
Affected ProductsAdobe Acrobat Reader DC (Windows/Mac) 24.005.20421 and earlier versions, Acrobat Classic and Acrobat 2020 versions
ImpactArbitrary code execution
Exploit PrerequisitesUser must open malicious file
CVSS 3.1 Score8.8

Out-of-Bounds Read Vulnerability (CVE-2025-27163)

CVE-2025-27163 is an out-of-bounds read vulnerability in the font functionality of Adobe Acrobat Reader that could lead to the disclosure of sensitive memory information. 

This vulnerability specifically relates to the OpenType font format parsing, particularly when processing the hhea and hmtx tables in embedded font files.

The vulnerability affects multiple versions of Adobe Acrobat Reader up to 25.001.20428.

Like other vulnerabilities in this series, exploitation requires user interaction—specifically opening a malicious PDF document containing specially crafted font data.

This vulnerability represents a significant security risk as it could allow attackers to access sensitive information stored in memory, potentially including cryptographic keys, passwords, or other confidential data.

Risk FactorsDetails
Affected ProductsAdobe Acrobat Reader 2024.005.20320 and versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier
ImpactMemory disclosure, ASLR bypass
Exploit PrerequisitesUser must open malicious file
CVSS 3.1 Score6.5

Out-of-Bounds Read Vulnerability (CVE-2025-27164)

CVE-2025-27164 is another out-of-bounds read vulnerability in Adobe Acrobat Reader’s font handling functionality. With a CVSS 3.1 score of 6.5, it’s classified as a medium-severity flaw.

This vulnerability also relates to the processing of OpenType font files embedded in PDF documents.  When exploited, it can lead to the disclosure of sensitive information from system memory.

The vulnerability is categorized under CWE-125 (Out-of-bounds Read) and affects Adobe Acrobat Reader 2024.005.20320 and earlier versions.

Like the other vulnerabilities, exploitation requires user interaction, with the attack vector being a specially crafted PDF file that must be opened by the victim.

Risk FactorsDetails
Affected ProductsAdobe Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier
ImpactMemory disclosure, ASLR bypass
Exploit PrerequisitesUser must open malicious file
CVSS 3.1 Score6.5

Mitigations

These vulnerabilities collectively represent a significant security risk, particularly for organizations that rely heavily on Adobe Acrobat Reader. 

Successful exploitation could allow attackers to execute arbitrary code, install malware, modify data, or create new user accounts with full privileges, depending on the rights of the compromised user.

Security experts strongly recommend that users and organizations immediately update to the latest versions of Adobe Acrobat and Reader that contain patches for these vulnerabilities. 

The updates were released on March 11, 2025, as part of Adobe’s regular security update cycle.

For those unable to update immediately, implementing network monitoring with updated Snort rules can help detect attempts to exploit these vulnerabilities.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Kaaviya

Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Recent Posts

ESET Integrates Detection & Response Capabilities With Splunk SIEM

ESET, a global leader in cybersecurity solutions, has announced a significant enhancement to its ESET…

7 minutes ago

Monitoring Dark Web Threats – CISO’s Proactive Approach

The dark web has rapidly become a central hub for cybercriminal activity, where stolen data,…

13 minutes ago

Nationwide Power Outages in Portugal & Spain Possibly Due to Cyberattack

A massive power outage struck the Iberian Peninsula on April 28, 2025, plunging millions of…

19 minutes ago

New RedExt Chrome Extension Tool for Red Teamers with Flask-based C2 Server

A sophisticated new red team tool called RedExt has recently been released, combining a Manifest…

55 minutes ago

Aligning Cybersecurity with Business Goals – CISO Insights

Cybersecurity has rapidly evolved from a back-office technical concern to a boardroom imperative. As digital…

2 hours ago

Ransomware Defense Playbook for CISOs in 2025

Ransomware has evolved into one of the most formidable threats to organizations worldwide, and 2025…

2 hours ago