CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Analysis
Use After Free (UAF) vulnerability in Adobe Acrobat Reader affecting versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier that enables arbitrary code execution with the privileges of the current user. The vulnerability requires user interaction (opening a malicious PDF file) but has a high CVSS score of 7.8 due to the severity of potential code execution impact. Without confirmed KEV listing or public POC data provided, this represents a significant but not yet confirmed active threat.
Technical Context
This vulnerability exploits a Use After Free (CWE-416) condition within Adobe Acrobat Reader's PDF parsing or rendering engine. UAF vulnerabilities occur when a program references memory that has been freed, allowing attackers to manipulate that memory space to achieve code execution. In the context of Acrobat Reader, a maliciously crafted PDF file can trigger premature deallocation of a critical object during document processing, and subsequent operations on freed pointers enable arbitrary code execution. The affected CPE range spans multiple major versions (20.x, 24.x, 25.x), indicating a longstanding vulnerability potentially present across different code branches. The requirement for user interaction (opening a file) is a critical factor that limits but does not eliminate real-world risk.
Affected Products
Adobe Acrobat Reader (['25.001.20521 and earlier (2025 release branch)', '24.001.30235 and earlier (2024 release branch)', '20.005.30763 and earlier (2020 release branch)'])
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17822