VULNERABILITY ๐ด 1รKEV
CVE-2026-34621 is a critical Remote Code Execution (RCE) vulnerability in Adobe Acrobat and Reader. Public technical details on the specific vulnerability class are not yet available. However, the CVSS score of 9.6 indicates a low-complexity attack vector that likely requires minimal user interaction, such as opening a specially crafted PDF document. Successful exploitation allows an attacker to execute arbitrary code on the victim's system, potentially with the privileges of the logged-in user.
The attack chain is initiated when a user opens a malicious PDF file. The exploit triggers the underlying vulnerability within the PDF parsing engine, leading to code execution. This type of vulnerability is common in complex file format parsers and often involves memory corruption bugs. The high impact and low complexity ratings suggest that the exploit does not require special configurations or authenticated access to the target system.
The primary driver for immediate action is the CONFIRMED evidence of active exploitation, as documented by its addition to the CISA KEV catalog on 2026-04-13. This designation overrides other metrics. Notably, the EPSS score is exceptionally low (0.00038), which would normally suggest a low probability of exploitation. This discrepancy is characteristic of a zero-day exploit used in targeted attacks before its discovery and public disclosure. Statistical models like EPSS require time and data to adjust to new threats, making the KEV catalog the authoritative source for prioritization in this case. The 'ZERO-DAY RACE' label accurately reflects the situation: defenders are responding to an exploit that was already in use by threat actors.