Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security

Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security

Posted on December 11, 2025December 11, 2025 By CWS

Essential safety updates for Acrobat and Reader can be found, addressing a number of vulnerabilities that might permit attackers to execute arbitrary code and bypass important security measures.

Adobe issued safety bulletin APSB25-119 on December 9, 2025, with a precedence score of three, affecting each Home windows and macOS platforms. The vulnerabilities stem from a number of weaknesses within the PDF processing engine.

VulnerabilityCategoryImpactSeverityCVSS ScoreCVEUntrusted Search PathCWE-426Arbitrary code executionCritical7.8CVE-2025-64785Out-of-bounds ReadCWE-125Arbitrary code executionCritical7.8CVE-2025-64899Improper Verification of Cryptographic SignatureCWE-347Security function bypassModerate3.3CVE-2025-64786Improper Verification of Cryptographic SignatureCWE-347Security function bypassModerate3.3CVE-2025-64787

How Attackers Might Exploit the Flaws

Two vital flaws allow arbitrary code execution by means of untrusted search path vulnerabilities and out-of-bounds learn errors. These points carry a CVSS base rating of seven.8, indicating extreme danger to customers.

Two extra reasonable vulnerabilities associated to improper verification of cryptographic signatures might permit attackers to bypass security measures, every with a CVSS rating of three.3.

The affected merchandise embody Acrobat DC, Acrobat Reader DC, Acrobat 2024, Acrobat 2020, and Acrobat Reader 2020 throughout all present variations.

ProductTrackAffected VersionsPlatformAcrobat DCContinuous25.001.20982 and earlierWindows & macOSAcrobat Reader DCContinuous25.001.20982 and earlierWindows & macOSAcrobat 2024Classic 2024Win – 24.001.30264 and earlier; Mac – 24.001.30273 and earlierWindows & macOSAcrobat 2020Classic 2020Win – 20.005.30793 and earlier; Mac – 20.005.30803 and earlierWindows & macOSAcrobat Reader 2020Classic 2020Win – 20.005.30793 and earlier; Mac – 20.005.30803 and earlierWindows & macOS

Adobe recommends putting in the most recent variations instantly. Customers can replace manually by means of Assist > Verify for Updates, or permit computerized updates to put in safety patches with out intervention.

The up to date variations embody Acrobat DC and Reader DC 25.001.20997, Acrobat 2024 variations 24.001.30307 (Home windows) and 24.001.30308 (macOS), and Acrobat 2020 variations 20.005.30838 throughout each platforms.

IT directors ought to deploy updates utilizing their most well-liked technique, resembling AIP-GPO, bootstrapper, or SCCM, for Home windows environments.

At present, Adobe studies no recognized exploits focusing on these vulnerabilities within the wild. Nonetheless, the vital nature of the failings and their potential for distant execution make immediate patching important.

Organizations ought to prioritize updating all affected Acrobat installations to stop potential compromise.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Acrobat, Adobe, Arbitrary, Attackers, Bypass, Code, Execute, Reader, Security, Vulnerabilities

Post navigation

Previous Post: Google Warns of Chrome 0-Day Vulnerability Actively Exploited in the wild
Next Post: Windows Defender Firewall Service Vulnerability Let Attackers Disclose Sensitive Data

Related Posts

Eurofiber Data Breach – Hackers Exploited Vulnerability to Exfiltrate Users’ Data Eurofiber Data Breach – Hackers Exploited Vulnerability to Exfiltrate Users’ Data Cyber Security News
VoidLink Framework Enables Dynamic Linux Tool Deployment VoidLink Framework Enables Dynamic Linux Tool Deployment Cyber Security News
Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks Cyber Security News
Meta Launches New Tools to Protect Messenger and WhatsApp Users from Scammers Meta Launches New Tools to Protect Messenger and WhatsApp Users from Scammers Cyber Security News
NCSC Warns of Oracle E-Business Suite 0-Day Vulnerability Actively Exploited in Attacks NCSC Warns of Oracle E-Business Suite 0-Day Vulnerability Actively Exploited in Attacks Cyber Security News
New DPRK Interview Campaign Leverages Fake Fonts to Deploy Malware New DPRK Interview Campaign Leverages Fake Fonts to Deploy Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark