Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27161: Out-of-bounds Read (CWE-125) in Adobe Acrobat Reader

0
High
VulnerabilityCVE-2025-27161cvecve-2025-27161cwe-125
Published: Tue Mar 11 2025 (03/11/2025, 18:10:14 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Acrobat Reader

Description

Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

AI-Powered Analysis

AILast updated: 02/26/2026, 20:02:41 UTC

Technical Analysis

CVE-2025-27161 is an out-of-bounds read vulnerability classified under CWE-125 affecting multiple versions of Adobe Acrobat Reader, including 24.001.30225, 20.005.30748, and 25.001.20428 and earlier. The vulnerability arises during the parsing of crafted PDF files, where the software reads beyond the allocated memory buffer, potentially exposing sensitive data or corrupting memory. This memory corruption can be leveraged by attackers to execute arbitrary code within the context of the current user. Exploitation requires user interaction, specifically opening a maliciously crafted PDF file, which triggers the vulnerability. The CVSS v3.1 base score is 7.8, reflecting high severity due to the combination of local attack vector, low attack complexity, no privileges required, required user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability poses a significant risk given Acrobat Reader's widespread use in enterprises and government agencies. The flaw highlights the importance of secure memory handling in PDF parsing components and the need for timely patching. Adobe has not yet released patches at the time of this report, so users should exercise caution when handling PDF files from untrusted sources.

Potential Impact

The vulnerability allows attackers to execute arbitrary code with the privileges of the current user, potentially leading to full system compromise if the user has elevated rights. Confidentiality is at risk due to possible memory disclosure from out-of-bounds reads. Integrity and availability can be affected through memory corruption leading to application crashes or malicious code execution. Organizations relying heavily on Adobe Acrobat Reader for document workflows, especially those handling sensitive or classified information, face increased risk of data breaches, espionage, or ransomware attacks. The requirement for user interaction limits remote exploitation but does not eliminate risk, as phishing or social engineering can induce victims to open malicious files. The widespread deployment of Acrobat Reader across industries, including finance, healthcare, government, and education, amplifies the potential impact. Without available patches, organizations remain vulnerable to targeted attacks exploiting this flaw.

Mitigation Recommendations

Until official patches are released, organizations should implement strict email and file filtering to block or quarantine suspicious PDF attachments. Employ sandboxing or isolated environments for opening untrusted PDF files to contain potential exploitation. Educate users about the risks of opening unsolicited or unexpected PDF documents, emphasizing phishing awareness. Enable and enforce the use of updated antivirus and endpoint detection and response (EDR) solutions capable of detecting exploit attempts targeting Acrobat Reader. Consider disabling or restricting Acrobat Reader usage where possible, or use alternative PDF readers with a better security posture temporarily. Monitor network and endpoint logs for unusual behaviors indicative of exploitation attempts. Once Adobe releases patches, prioritize immediate deployment across all affected systems. Additionally, apply the principle of least privilege to user accounts to limit the impact of potential code execution.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-02-19T22:28:19.016Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a45b85912abc71d6687f

Added to database: 2/26/2026, 7:51:55 PM

Last enriched: 2/26/2026, 8:02:41 PM

Last updated: 2/26/2026, 11:09:37 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses