CVE Alert: CVE-2025-54257 – Adobe – Acrobat Reader

CVE-2025-54257

HIGHNo exploitation known

Acrobat Reader versions 24.001.30254, 20.005.30774, 25.001.20672 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file, and scope is unchanged.

CVSS v3.1 (7.8)
AV LOCAL · AC LOW · PR NONE · UI REQUIRED · S UNCHANGED
Vendor
Adobe
Product
Acrobat Reader
Versions
0 lte 25.001.20672
CWE
CWE-416, Use After Free (CWE-416)
Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Published
2025-09-09T20:08:48.397Z
Updated
2025-09-10T03:56:20.546Z

AI Summary Analysis

Risk verdict

High risk, with potential for rapid impact if a user opens a crafted PDF; no confirmed active exploitation noted at present.

Why this matters

An attacker could execute arbitrary code in the victim’s context simply by prompting a user to open a malicious file, risking full compromise of the affected endpoint. The impact spans confidentiality, integrity, and availability, enabling data exposure, malware deployment, or persistence within the host; enterprise threat exposure increases with widespread Acrobat deployment.

Most likely attack path

Local attacker, low complexity, no privileges required but with user interaction needed. An attacker would need a victim to open a specially crafted PDF, triggering a use-after-free and code execution under the user’s rights. After initial access, lateral movement is constrained by user privileges and the host’s security controls, but successful execution could enable payload deployment and data access on that device.

Who is most exposed

Any organisation with Windows-based Acrobat Reader deployed across end-user devices or document-centric workflows (email attachments, shared PDFs) is at higher risk, especially where users regularly open external PDFs from untrusted sources.

Detection ideas

  • Acrobat crashes or becomes unresponsive immediately after opening a PDF.
  • Heap/memory corruption symptoms; crash dumps mentioning use-after-free patterns.
  • Unusual process trees: Acrobat spawning unexpected child processes or injecting code.
  • Post-open activity with abnormal network or file-system access from the Acrobat process.
  • EDR alerts for suspicious payloads loaded after PDF interaction.

Mitigation and prioritisation

  • Apply the latest Acrobat Reader patch releasing fixes for this issue.
  • Enable Protected View/Enhanced Security and sandboxing for PDFs.
  • Restrict or monitor attachment handling; block auto-opening of attachments from external sources.
  • Ensure endpoint EDR visibility and enable anomaly alerts around Acrobat memory/CPU spikes.
  • Coordinate patch windows with change-management; test in a staging cohort before broad rollout. If KEV or EPSS signals were present, treat as priority 1; currently use standard high-priority remediation.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.