Adobe Reader High-Severity Flaw is Being Actively Exploited

Share This Post

Yesterday (10/10/23), a high-severity flaw in Adobe Acrobat Reader was added to CISA’s (United States Cybersecurity and Infrastructure Security Agency) database of Known Exploited Vulnerabilities. There is evidence that the flaw is being actively exploited, though no details around the nature of exploitation or the threat actors involved have been released at this time.

Categorized as a “Use-After-Free” bug, (where dynamic memory location pointers are not properly cleared by a program, creating an error that can be used by attackers) CVE-2023-21608 has a CVSS score of 7.8 and has had a proof-of-concept exploit for the flaw available for use that was first circulated in January of 2023. This exploit is capable of executing remote code on the victim’s system with the privileges of the current user account.

The good news is that a patch for the flaw was released around the same time as the Proof of Concept exploit. The bad news is that Adobe Acrobat Reader is a very commonly-used and regularly-downloaded piece of software across countless industries and job roles. Managed, distributed installations of the patch(es) that repair this flaw should be deliberate and thorough. The following versions of the software are impacted:

  • Acrobat DC – 22.003.20282 (Windows), 22.003.20281 (Mac) and earlier versions (fixed in 22.003.20310)
  • Acrobat Reader DC – 22.003.20282 (Windows), 22.003.20281 (Mac) and earlier versions (fixed in 22.003.20310)
  • Acrobat 2020 – 20.005.30418 and earlier versions (fixed in 20.005.30436)
  • Acrobat Reader 2020 – 20.005.30418 and earlier versions (fixed in 20.005.30436)

For information on Adobe’s security update from January, 2023, please click here: https://helpx.adobe.com/security/products/acrobat/apsb23-01.html
For more information on CVE-2023-21608, please click here:
https://nvd.nist.gov/vuln/detail/CVE-2023-21608



Reach out to our incident response team for help

More To Explore

Information Security News – 5/12/2025

Microsoft Sets Passkeys Default for New Accounts Article Link: https://thehackernews.com/2025/05/microsoft-sets-passkeys-default-for-new.html Accenture: What We Learned When Our CEO Got Deepfaked Article Link: https://www.computing.co.uk/event/2025/accenture-what-we-learned-when-our-ceo-got-deepfaked Ghost Students Creating

Information Security News – 5/5/2025

Cloudflare Sees a Big Jump in DDoS Attacks Article Link: https://www.bleepingcomputer.com/news/security/cloudflare-mitigates-record-number-of-ddos-attacks-in-2025/ Bring Your Own Computer Trend Gives Cyber Pros Chills, Yet It’s Here to Stay

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.