Acrobat Reader has an unpatched zero-day. Cease opening unknown PDFs
Abstract created by Good Solutions AI
In abstract:
- PCWorld studies that Adobe Acrobat Reader accommodates an unpatched zero-day vulnerability that hackers have actively exploited since December.
- Merely opening a malicious PDF file can allow attackers to steal information and probably acquire distant management of your system.
- Customers ought to instantly cease opening PDF recordsdata from untrusted sources till Adobe releases a safety patch for this important flaw.
In accordance with BleepingComputer, there’s a critical vulnerability in Acrobat Reader that may be exploited to steal delicate information.
Safety researcher Haifei Li says that hackers have been abusing this “extremely refined, fingerprinting-style PDF exploit” since December, that means simply over 4 months.
“This ‘fingerprinting’ exploit has been confirmed to leverage a zero-day/unpatched vulnerability that works on the newest model of Adobe Reader with out requiring any person interplay past opening a PDF file. Much more regarding, this exploit permits the risk actor to not solely accumulate/steal native data but in addition probably launch subsequent RCE/SBX assaults, which might result in full management of the sufferer’s system.”
Briefly, all it takes is opening an contaminated PDF file to reveal your system to an attacker. From there, the attacker might steal your information and even run their very own code and take full management of your machine.
Till Adobe patches the vulnerability, Acrobat Reader customers are suggested to not open PDF recordsdata from untrusted sources—which is actually good sense even with out the specter of this exploit.
This text initially appeared on our sister publication PC för Alla and was translated and localized from Swedish.

