Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2026/VULN294
_____________________________________________________________________

DATE                : 12/03/2026

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Adobe Acrobat, Acrobat Reader
                              versions prior to 25.001.21288,
                     Acrobat versions prior to 24.001.30356.

=====================================================================
https://helpx.adobe.com/security/products/acrobat/apsb26-26.html
_____________________________________________________________________


Last updated on Mar 10, 2026

Security update available for Adobe Acrobat Reader  | APSB26-26

Bulletin ID           Date Published            Priority

APSB26-26             March 10, 2026            3


Summary

Adobe has released a security update for Adobe Acrobat and Reader for
Windows and macOS. This update addresses critical and important
vulnerabilities. Successful exploitation could lead to arbitrary
code execution and privilege escalation.

 Adobe is not aware of any exploits in the wild for any of the issues
addressed in these updates.
Affected Versions


Product        Track            Affected Versions       Platform

Acrobat DC   Continuous   25.001.21265 and earlier   Windows &  macOS

Acrobat Reader DC  Continuous  25.001.21265 and earlier  Windows & macOS

Acrobat 2024  Classic 2024  Win - 24.001.30307 and earlier  
                            Mac - 24.001.30308 and earlier  Windows & macOS

For questions regarding Acrobat DC, please visit the Acrobat
DC FAQ page. 

For questions regarding Acrobat Reader DC, please visit the
Acrobat Reader DC FAQ page.


Solution

Adobe recommends users update their software installations to the latest
versions by following the instructions below.    

The latest product versions are available to end users via one of the
following methods:    

    Users can update their product installations manually by choosing
Help > Check for Updates.     

    The products will update automatically, without requiring user
intervention, when updates are detected.     
    Users can manually download and install updates for the latest
version HERE. 

For IT administrators (managed environments):     

    Refer to the specific release note version for links to installers.     

    Install updates via your preferred methodology, such as AIP-GPO,
bootstrapper, SCUP/SCCM (Windows), or on macOS, Apple Remote Desktop
and SSH.     
 

Adobe categorizes these updates with the following priority ratings and
recommends users update their installation to the newest version:    


Product     Track     Updated Versions     Platform   Priority Rating
Availability

Acrobat DC   Continuous   25.001.21288   Windows and macOS   3
Release Notes     

Acrobat Reader DC   Continuous   25.001.21288   Windows and macOS  3
Release Notes     

Acrobat 2024   Classic 2024   24.001.30356    Windows  and macOS  3
Release Notes 


Vulnerability Details

Vulnerability Category 	   Vulnerability Impact     Severity 
CVSS base score 	CVSS vector 	CVE Number

Use After Free (CWE-416) 	Arbitrary code execution 	Critical
7.8 	CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 	CVE-2026-27220

Use After Free (CWE-416) 	Arbitrary code execution 	Critical
7.8 	CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 	CVE-2026-27278

Improper Verification of Cryptographic Signature (CWE-347) 
Privilege escalation 	Important 	5.5 
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N 	CVE-2026-27221


Acknowledgements

Adobe would like to thank the following researchers for reporting
these issues and for working with Adobe to help protect our
customers:   

    Anonymous working with Zero Day Initiative (ZDI) -
CVE-2026-27220, CVE-2026-27278

    evirapatrin - CVE-2026-27221

NOTE: Adobe has a public bug bounty program with HackerOne. If
you are interested in working with Adobe as an external
security researcher, please check out
https://hackerone.com/adobe

For more information, visit https://helpx.adobe.com/security.html,
or email PSIRT@adobe.com.


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




