Three critical vulnerabilities have been discovered in Adobe Acrobat Reader that could enable attackers to execute arbitrary code or expose sensitive information. These vulnerabilities, identified by Cisco Talos, affect several versions of the widely used PDF software, presenting serious security risks to users who unknowingly open malicious PDF files. One of these flaws, CVE-2025-27158, is a memory corruption issue linked to an uninitialized pointer in the software’s font handling functionality. This high-severity vulnerability, with a CVSS 3.1 score of 8.8, allows attackers to run arbitrary code on a victim’s system when a specially crafted PDF file is opened. The flaw affects Adobe Acrobat Reader version 2024.005.20320 and potentially earlier versions, and could lead to significant system compromise and unauthorized access to sensitive data. Another vulnerability, CVE-2025-27163, is an out-of-bounds read issue that impacts Adobe Acrobat Reader’s ability to process embedded OpenType fonts, specifically when handling the hhea and hmtx tables. This flaw poses a security risk by allowing attackers to access sensitive memory information, such as cryptographic keys or passwords. It affects multiple versions of Adobe Acrobat Reader, up to version 25.001.20428. Like the previous vulnerability, successful exploitation requires the user to open a malicious PDF containing specially crafted font data, potentially exposing critical information. The third vulnerability, CVE-2025-27164, is also an out-of-bounds read flaw in Adobe Acrobat Reader’s font processing functionality, scoring a medium-severity CVSS 3.1 rating of 6.5. Similar to the previous vulnerabilities, it involves the parsing of OpenType fonts embedded in PDF files and can lead to the disclosure of sensitive system memory data. It affects versions of Adobe Acrobat Reader up to 2024.005.20320. Exploitation of this vulnerability also requires user interaction, with the victim being tricked into opening a malicious PDF document.
A large-scale phishing campaign has been identified leveraging RFQ (Request for Quotation) themed emails to distribute credential-stealing malware. Attackers disguise malicious HTM...
Two critical vulnerabilities in Progress ShareFile have been identified that can be chained to achieve pre-authentication remote code execution (RCE). Discovered by watchTowr resea...
The FBI has issued a warning highlighting potential security and privacy risks associated with widely used mobile applications developed by Chinese companies. These applications, a...