Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64785: Untrusted Search Path (CWE-426) in Adobe Acrobat Reader

0
High
VulnerabilityCVE-2025-64785cvecve-2025-64785cwe-426
Published: Tue Dec 09 2025 (12/09/2025, 20:21:05 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Acrobat Reader

Description

Acrobat Reader versions 24.001.30264, 20.005.30793, 25.001.20982, 24.001.30273, 20.005.30803 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute arbitrary code in the context of the current user. If the application uses a search path to locate critical resources such as programs, an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue does not require user interaction.

AI-Powered Analysis

AILast updated: 01/07/2026, 19:36:52 UTC

Technical Analysis

CVE-2025-64785 is an Untrusted Search Path vulnerability (CWE-426) identified in Adobe Acrobat Reader versions 20.005.30793, 24.001.30264, 24.001.30273, 25.001.20982, and earlier. This vulnerability arises when Acrobat Reader uses a search path to locate critical resources, such as executable programs or libraries, without properly validating or securing the path. An attacker with local access can manipulate the search path environment or place malicious executables in directories that are searched before the legitimate ones. As a result, when Acrobat Reader attempts to load a resource, it may inadvertently execute the attacker's code under the context of the current user. The vulnerability does not require user interaction, increasing the risk of silent exploitation. The CVSS 3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The impact on confidentiality, integrity, and availability is high, as arbitrary code execution can lead to data theft, system compromise, or denial of service. Although no public exploits are known yet, the vulnerability is significant due to the widespread use of Acrobat Reader in enterprise and consumer environments. The lack of available patches at the time of publication necessitates immediate mitigation efforts to reduce risk.

Potential Impact

For European organizations, this vulnerability poses a substantial risk because Adobe Acrobat Reader is widely used across various sectors including government, finance, healthcare, and critical infrastructure. Successful exploitation can lead to arbitrary code execution, allowing attackers to steal sensitive information, alter or destroy data, or disrupt business operations. The fact that exploitation does not require elevated privileges or user interaction increases the threat level, especially in environments where local access can be gained through other means such as phishing, insider threats, or compromised endpoints. Organizations handling sensitive personal data under GDPR may face compliance risks and financial penalties if breaches occur. Additionally, critical infrastructure operators could experience operational disruptions, potentially impacting public safety and economic stability. The vulnerability's local attack vector means that attackers need some level of access, but once inside, they can escalate their foothold significantly. This makes it a valuable tool for lateral movement in targeted attacks or ransomware campaigns.

Mitigation Recommendations

1. Monitor Adobe's official channels for patches and apply them immediately once available. 2. Until patches are released, restrict write permissions on directories included in Acrobat Reader's search path to prevent unauthorized modification or insertion of malicious executables. 3. Implement application whitelisting to ensure only trusted executables can run, limiting the ability of attackers to execute arbitrary code. 4. Employ endpoint detection and response (EDR) solutions to monitor for suspicious process creation or unusual file system changes related to Acrobat Reader. 5. Educate users about the risks of local access compromise and enforce strong access controls, including least privilege principles, to reduce the likelihood of attackers gaining local access. 6. Regularly audit and harden system environment variables and search paths to prevent manipulation. 7. Use sandboxing or containerization for Acrobat Reader where feasible to limit the impact of potential exploitation. 8. Maintain up-to-date backups and incident response plans to quickly recover from any compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-11T22:48:38.823Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69388b5252fe50f9a48983b4

Added to database: 12/9/2025, 8:49:22 PM

Last enriched: 1/7/2026, 7:36:52 PM

Last updated: 2/7/2026, 9:17:29 AM

Views: 797

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats