Security researchers have discovered an unpatched zero-day vulnerability in Adobe Acrobat and Reader that is under active exploitation in the wild. The campaign, observed since at least December 2025, uses malicious PDF files to trigger the flaw. The vulnerability is a logic bug, not a memory-corruption issue, that allows sandboxed JavaScript within a PDF to call privileged APIs. This enables an attacker to read arbitrary files from the victim's local file system and exfiltrate them to a remote server. The attack requires no user interaction beyond opening the malicious PDF. Evidence suggests the campaign is targeted, using lures related to the oil and gas industry. Adobe has not yet released a patch, leaving users vulnerable.
This is not a typical memory corruption vulnerability. Instead, it's a flaw in the application's logic that fails to properly restrict access to powerful, privileged JavaScript APIs from within the sandboxed environment. The exploit specifically abuses the util.readFileIntoStream API to read local files and the RSS.addFeed API to communicate with the command-and-control (C2) server for data exfiltration and to retrieve additional payloads.
The vulnerability is actively exploited. The campaign was discovered after a weaponized PDF named yummy_adobe_exploit_uwu.pdf was uploaded to the public malware analysis service EXPMON. The JavaScript inside the PDF is heavily obfuscated. When a victim opens the file, the script executes, performing the following actions:
util.readFileIntoStream API to read local files (e.g., from the system32 folder).RSS.addFeed API to connect to the C2 and download an additional AES-encrypted JavaScript payload for further actions.Forensic analysis revealed Russian-language decoy content related to the oil and gas sector, strongly suggesting these are targeted attacks against specific individuals or organizations rather than a widespread, opportunistic campaign.
The primary impact is data theft. An attacker can use this vulnerability to steal sensitive documents, configuration files, credentials, or any other file on the victim's machine that the user has permission to read. In a targeted attack against a corporate executive in the oil and gas industry, this could lead to the theft of:
This type of targeted intelligence gathering can have severe economic and strategic consequences for the victim organization.
| Type | Value | Description |
|---|---|---|
| file_name | yummy_adobe_exploit_uwu.pdf |
The specific filename of the exploit sample uploaded to EXPMON. |
| network_traffic_pattern | Outbound connections from AcroRd32.exe to unknown IPs |
Adobe Reader should not be making arbitrary outbound connections. This is highly suspicious. |
| api_endpoint | util.readFileIntoStream |
The privileged API abused to read local files. Monitoring for its invocation from a sandboxed context would be a key detection method. |
| api_endpoint | RSS.addFeed |
The API used for C2 communications. Its use is anomalous in most contexts. |
Detecting this exploit requires monitoring application behavior and network traffic.
AcroRd32.exe). Specifically, look for the process making outbound network connections or attempting to read files outside of its expected directories.AcroRd32.exe. Block any such connections to untrusted or unknown destinations.D3FEND Reference: Key detection strategies include D3-PA - Process Analysis to observe AcroRd32.exe's file access and network activity, and D3-OTF - Outbound Traffic Filtering to block the exfiltration channel.
Until Adobe releases a patch, users are reliant on compensating controls.
M1054 - Software Configuration.D3FEND Reference: Disabling JavaScript is a form of D3-ACH - Application Configuration Hardening. This is the most effective proactive defense until a patch is available.
Adobe released emergency patch CVE-2026-34621 on April 12, 2026, for the actively exploited Acrobat/Reader zero-day, clarifying it as a prototype pollution flaw.
Disable potentially dangerous features in software, such as JavaScript in PDF readers, to reduce the attack surface.
Use email and web filtering to block malicious PDFs and prevent connections to C2 servers.
Train users to be cautious of unsolicited attachments and to verify their legitimacy before opening.
The most effective immediate mitigation for this Adobe Reader zero-day is Application Configuration Hardening. Specifically, administrators should enforce a policy to disable JavaScript execution within Adobe Reader across all endpoints. The entire exploit chain relies on the execution of obfuscated JavaScript embedded in the PDF. By disabling this feature, the initial trigger for the attack is removed. This can be done via Group Policy (GPO) in a Windows environment or through MDM for other platforms. While this may break functionality in a small number of legitimate, interactive PDFs, the security benefit of neutralizing this active zero-day threat far outweighs the inconvenience. This action directly hardens the application's configuration to close the attack surface exploited by the threat actor, providing protection even without a vendor patch.
As a critical layer of defense-in-depth, Outbound Traffic Filtering can prevent the ultimate goal of this attack: data exfiltration. Configure endpoint and perimeter firewalls to block all outbound network connections from the Adobe Reader process (AcroRd32.exe). There is no legitimate reason for the PDF reader application to be initiating connections to arbitrary servers on the internet. By implementing a default-deny rule for this process's network access, you can sever the C2 channel. Even if a user opens the malicious PDF and the exploit successfully reads local files, this control will prevent those files from being sent to the attacker's server. This turns a successful data theft attack into a contained, failed attempt, and the resulting blocked connection logs can serve as a high-fidelity alert for incident response.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats