Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43577: Use After Free (CWE-416) in Adobe Acrobat Reader

0
High
VulnerabilityCVE-2025-43577cvecve-2025-43577cwe-416
Published: Tue Jun 10 2025 (06/10/2025, 19:11:34 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Acrobat Reader

Description

Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:21:06 UTC

Technical Analysis

CVE-2025-43577 is a Use After Free (CWE-416) vulnerability identified in multiple versions of Adobe Acrobat Reader, including 24.001.30235, 20.005.30763, and 25.001.20521 and earlier. The vulnerability arises when Acrobat Reader improperly manages memory, leading to a condition where freed memory is accessed, which can be manipulated by attackers to execute arbitrary code. This execution occurs in the context of the current user, potentially allowing attackers to compromise the system's confidentiality, integrity, and availability. Exploitation requires the victim to open a maliciously crafted PDF file, making user interaction mandatory. The CVSS 3.1 base score of 7.8 reflects high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches or known exploits are currently reported, but the vulnerability's nature and Adobe Acrobat Reader's ubiquity make it a critical concern. Attackers could leverage this flaw to deploy malware, steal sensitive information, or disrupt operations. The vulnerability was reserved in April 2025 and published in June 2025, indicating recent discovery and disclosure.

Potential Impact

The impact of CVE-2025-43577 is significant for organizations worldwide due to the widespread use of Adobe Acrobat Reader across enterprises, government agencies, and individual users. Successful exploitation can lead to arbitrary code execution, allowing attackers to install malware, ransomware, or spyware, steal sensitive data, or disrupt critical business operations. Since the code executes with the current user's privileges, the severity depends on the user's access level; administrative users are at higher risk. The requirement for user interaction limits mass exploitation but does not eliminate targeted attacks, especially via phishing campaigns or malicious document distribution. The vulnerability threatens confidentiality by exposing sensitive information, integrity by enabling unauthorized code execution, and availability by potentially causing application or system crashes. Organizations with heavy reliance on PDF workflows, such as legal, financial, and healthcare sectors, face elevated risks. The absence of known exploits in the wild currently provides a window for proactive defense, but the vulnerability's high CVSS score demands urgent attention.

Mitigation Recommendations

To mitigate CVE-2025-43577 effectively, organizations should: 1) Monitor Adobe’s official channels closely and apply security patches immediately once released. 2) Temporarily disable JavaScript execution within Acrobat Reader, as malicious PDFs often leverage scripting to exploit vulnerabilities. 3) Implement strict email and file filtering to block or quarantine suspicious PDF files from untrusted sources. 4) Employ application whitelisting and sandboxing technologies to restrict Acrobat Reader’s ability to execute arbitrary code or access sensitive system resources. 5) Educate users about the risks of opening unsolicited or unexpected PDF attachments, emphasizing verification of sender authenticity. 6) Use endpoint detection and response (EDR) tools to monitor for anomalous behaviors indicative of exploitation attempts. 7) Consider deploying alternative PDF readers with a lower attack surface in sensitive environments until patches are available. These measures, combined, reduce the attack surface and limit the potential for successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-16T16:23:13.181Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684888ea5669e5710431efd0

Added to database: 6/10/2025, 7:35:06 PM

Last enriched: 2/27/2026, 2:21:06 AM

Last updated: 3/24/2026, 7:07:37 PM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses