Adobe Acrobat CVE-2026-34621: How to identify and fix vulnerable assets

TL;DR: A critical vulnerability in Adobe Acrobat and Adobe Reader (CVE-2026-34621), with a CVSS score of 8.6 and confirmed active exploitation, allows attackers to execute arbitrary code via maliciously crafted PDF files. Adobe's initial patch was bypassed (CVE-2026-34622), requiring a secondary emergency update. |
What is CVE-2026-34621 and why is it critical?
CVE-2026-34621 is a high-severity vulnerability affecting the embedded JavaScript execution engine within Adobe Acrobat and Reader. Attackers have actively exploited this zero-day flaw since at least December 2025 using socially engineered PDFs. CVE-2026-34621 was listed on both NVD and CISA KEV on April 13. Additional information, including patching instructions, is available at Adobe's Security Bulletin.
The vulnerability:
Has a CVSS base score of 8.6 (Critical).
Is a Prototype Pollution flaw (CWE-1321) that allows arbitrary code execution in the context of the current user.
Uses privileged Acrobat APIs like util.readFileIntoStream() to silently extract local files and exfiltrate data.
Was subjected to a critical patch bypass (CVE-2026-34622), requiring a secondary emergency update from Adobe.
As of April 15, 2026, multiple versions are impacted. Ensure you are targeting the post-bypass secure baselines.
Systems affected – Windows and MacOS systems running the following versions:
Product | Affected Versions | Update Track |
Acrobat DC | 26.001.21367 and earlier | Continuous |
Acrobat Reader DC | 26.001.21367 and earlier | Continuous |
Acrobat 2024 | 24.001.30356 and earlier | Classic |
Systems not affected:
Acrobat DC and Acrobat Reader DC updated to version 26.001.21431 or later.
Acrobat 2024 updated to version 24.001.30365 or later.
Note on update track: In Adobe Acrobat, "Continuous" and "Classic" determine how and when your software gets updated. Software on the Continuous track gets constant/silent app updates while classic requires a manual download and patch.
How to identify assets vulnerable to CVE-2026-34621 with Axonius
The Axonius queries below will help you identify assets vulnerable to CVE-2026-34621 across your infrastructure and software estate. Before you begin, perform a global discovery to ensure your asset data is current.
1. Identify vulnerable Acrobat instances detected by your vulnerability scanners
To find instances of the CVE-2026-34621 already identified by your vulnerability scanners, go to Assets > Exposures > Aggregated Security Findings and search for:
{"vulnerabilities":"(\"specific_data.data.cve_id\" == \"CVE-2026-34621\")","devices":""} |
2. Identify vulnerable assets running Acrobat and NOT found by your scanners
To reduce the mean time to detection (MTTD) or deployment gaps from vulnerability scanners, go to Assets > Software and then search for all Acrobat instances (excluding the Acrobat Update Utility):
{"software":"(\"specific_data.data.software_name_preferred\" == regex(\"Acrobat\", \"i\")) and not (\"specific_data.data.software_name_preferred\" == regex(\"Update\", \"i\"))","devices":""} |
From the results, click the link under device count to get a list of affected assets.
Remediation and mitigation guidance for CVE-2026-34621
Update Adobe Acrobat DC and Reader DC to version 26.001.21431 or later, and Acrobat 2024 to version 24.001.30365 or later; these are the post-bypass secure baselines. The U.S. CISA mandates federal agencies to patch by April 27, 2026, under BOD 22-01.
Recommended patch versions and deployment methods
Acrobat DC / Reader DC (Continuous): Update immediately to the secure baseline listed above.
Acrobat 2024 (Classic): Update immediately to the secure baseline listed above.
Deploy updates centrally using AIP-GPO, bootstrapper, SCUP/SCCM, Apple Remote Desktop, or SSH.
Compensating controls if immediate patching is not possible
Disable JavaScript in Adobe Acrobat and Reader to neutralize the exploit chain at an architectural level.
Do not open PDF files from untrusted sources (successful exploitation requires a user opening a malicious file).
Block outbound HTTP/HTTPS traffic originating from endpoints where the User-Agent contains the string "Adobe Synchronizer" to disrupt data exfiltration.
Monitor endpoint detection systems for anomalous child processes or unexpected file reads originating from Acrobat.exe or AcroRd32.exe.
Where to find more information on CVE-2026-34621
The following resources provide official patch details, exploit timelines, and threat analysis for CVE-2026-34621 and its subsequent bypass (CVE-2026-34622):
Categories
- threats_vulnerabilities

Get Started
See how to make asset intelligence actionable with a guided demo:
- Stop chasing data — work from one asset model your entire team can trust.
- See what's exposed before it's a problem — surface coverage gaps automatically.
- Turn alert noise into action — cut thousands of alerts down, to the ones that matter.
