CVE-2025-27164: Out-of-bounds Read (CWE-125) in Adobe Acrobat Reader
Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
AI Analysis
Technical Summary
CVE-2025-27164 is a medium-severity security vulnerability classified as an out-of-bounds read (CWE-125) affecting multiple versions of Adobe Acrobat Reader, including 24.001.30225, 20.005.30748, 25.001.20428, and earlier. This vulnerability occurs when the software reads memory outside the bounds of a buffer, which can lead to the disclosure of sensitive information stored in adjacent memory regions. Such information leakage can aid attackers in bypassing memory protection mechanisms like Address Space Layout Randomization (ASLR), which randomizes memory addresses to prevent exploitation. The attack vector requires local access with user interaction, specifically the opening of a crafted malicious PDF file by the victim. The vulnerability does not allow code execution or modification of data but compromises confidentiality by exposing sensitive memory contents. The CVSS 3.1 base score of 5.5 reflects the medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity (I:N) or availability (A:N). Currently, there are no known exploits in the wild, and no patches have been linked yet. However, given Adobe Acrobat Reader's widespread use globally, this vulnerability poses a significant risk to users who open untrusted PDF files.
Potential Impact
The primary impact of CVE-2025-27164 is the potential disclosure of sensitive information from the memory space of Adobe Acrobat Reader processes. This can include cryptographic keys, user credentials, or other confidential data residing in memory, which attackers can leverage to further compromise systems or escalate privileges. By bypassing ASLR, attackers can improve the reliability of subsequent exploits, potentially leading to more severe attacks such as remote code execution. Although this vulnerability does not directly affect system integrity or availability, the confidentiality breach can have serious consequences, especially in environments handling sensitive or classified information. Organizations worldwide that rely on Adobe Acrobat Reader for document handling are at risk, particularly those in sectors like finance, government, healthcare, and critical infrastructure. The requirement for user interaction limits the attack scope but does not eliminate risk, as phishing or social engineering can be used to trick users into opening malicious PDFs.
Mitigation Recommendations
To mitigate CVE-2025-27164, organizations should implement the following specific measures: 1) Monitor Adobe’s official channels for patches and apply updates promptly once available to affected Acrobat Reader versions. 2) Enforce strict email and file filtering policies to block or quarantine suspicious PDF attachments from untrusted sources. 3) Educate users about the risks of opening unsolicited or unexpected PDF files, emphasizing caution with attachments from unknown senders. 4) Utilize application whitelisting or sandboxing technologies to isolate Acrobat Reader processes, limiting the impact of potential memory disclosure. 5) Deploy endpoint detection and response (EDR) solutions capable of identifying anomalous behaviors related to PDF processing or memory access. 6) Consider disabling JavaScript and other potentially exploitable features within Acrobat Reader to reduce attack surface. 7) Implement network segmentation to restrict access to sensitive systems in case of compromise. These targeted actions go beyond generic advice by focusing on controlling the attack vector and limiting exposure until patches are available.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, China, India, Canada, Australia
CVE-2025-27164: Out-of-bounds Read (CWE-125) in Adobe Acrobat Reader
Description
Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
AI-Powered Analysis
Technical Analysis
CVE-2025-27164 is a medium-severity security vulnerability classified as an out-of-bounds read (CWE-125) affecting multiple versions of Adobe Acrobat Reader, including 24.001.30225, 20.005.30748, 25.001.20428, and earlier. This vulnerability occurs when the software reads memory outside the bounds of a buffer, which can lead to the disclosure of sensitive information stored in adjacent memory regions. Such information leakage can aid attackers in bypassing memory protection mechanisms like Address Space Layout Randomization (ASLR), which randomizes memory addresses to prevent exploitation. The attack vector requires local access with user interaction, specifically the opening of a crafted malicious PDF file by the victim. The vulnerability does not allow code execution or modification of data but compromises confidentiality by exposing sensitive memory contents. The CVSS 3.1 base score of 5.5 reflects the medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity (I:N) or availability (A:N). Currently, there are no known exploits in the wild, and no patches have been linked yet. However, given Adobe Acrobat Reader's widespread use globally, this vulnerability poses a significant risk to users who open untrusted PDF files.
Potential Impact
The primary impact of CVE-2025-27164 is the potential disclosure of sensitive information from the memory space of Adobe Acrobat Reader processes. This can include cryptographic keys, user credentials, or other confidential data residing in memory, which attackers can leverage to further compromise systems or escalate privileges. By bypassing ASLR, attackers can improve the reliability of subsequent exploits, potentially leading to more severe attacks such as remote code execution. Although this vulnerability does not directly affect system integrity or availability, the confidentiality breach can have serious consequences, especially in environments handling sensitive or classified information. Organizations worldwide that rely on Adobe Acrobat Reader for document handling are at risk, particularly those in sectors like finance, government, healthcare, and critical infrastructure. The requirement for user interaction limits the attack scope but does not eliminate risk, as phishing or social engineering can be used to trick users into opening malicious PDFs.
Mitigation Recommendations
To mitigate CVE-2025-27164, organizations should implement the following specific measures: 1) Monitor Adobe’s official channels for patches and apply updates promptly once available to affected Acrobat Reader versions. 2) Enforce strict email and file filtering policies to block or quarantine suspicious PDF attachments from untrusted sources. 3) Educate users about the risks of opening unsolicited or unexpected PDF files, emphasizing caution with attachments from unknown senders. 4) Utilize application whitelisting or sandboxing technologies to isolate Acrobat Reader processes, limiting the impact of potential memory disclosure. 5) Deploy endpoint detection and response (EDR) solutions capable of identifying anomalous behaviors related to PDF processing or memory access. 6) Consider disabling JavaScript and other potentially exploitable features within Acrobat Reader to reduce attack surface. 7) Implement network segmentation to restrict access to sensitive systems in case of compromise. These targeted actions go beyond generic advice by focusing on controlling the attack vector and limiting exposure until patches are available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- adobe
- Date Reserved
- 2025-02-19T22:28:19.017Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a45b85912abc71d66889
Added to database: 2/26/2026, 7:51:55 PM
Last enriched: 2/26/2026, 8:01:49 PM
Last updated: 2/26/2026, 11:17:45 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.