{"id":1832,"date":"2021-05-12T15:45:34","date_gmt":"2021-05-12T10:15:34","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1832"},"modified":"2021-06-07T11:26:41","modified_gmt":"2021-06-07T05:56:41","slug":"hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/","title":{"rendered":"Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild!"},"content":{"rendered":"\n<p><p style=\"text-align: justify\">Adobe is now going to release the patch on Tuesday that fixed various vulnerabilities linked with 12 different items and that also deals with zero-day flaws that affect the Adobe reader flaws that go wild and exploited.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">However, they also share the list of applications that deal with Adobe Experience Manager, Adobe InDesign, Adobe Illustrator, Adobe InCopy, Adobe Genuine Service, Adode Acrobat and Reader, Adobe Creative Cloud Desktop Application, Adobe After Effects, Adobe Medium, Magento, and Adobe Animate.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Although, the company acknowledged that they received the reports that these vulnerabilities have been exploited in the wild and the attackers are targeting the Adobe Reader users who access the Windows platform. These vulnerabilities are tracked as CVE-2021-28550 and the zero-day are linked with the arbitrary code execution flaw that may permit the adversaries to execute the virtual command on the targeted systems.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"728\" height=\"561\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/hackers-exploit-vulnerbilities-adobe-player-image.jpg\" alt=\"Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild!\" class=\"wp-image-1834\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/hackers-exploit-vulnerbilities-adobe-player-image.jpg 728w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/hackers-exploit-vulnerbilities-adobe-player-image-300x231.jpg 300w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">Meanwhile, these targeted attacks are aiming to infect Windows users and affect both macOS and Windows versions of Acrobat DC, Acrobat 2020, Acrobat Reader DC, Acrobat 2017, and Acrobat Reader 2017. The unknown researcher reported these vulnerabilities.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Whereas, 10 critical and 4 important vulnerabilities are also identified in Adobe Acrobat and other Reader programs that followed the remediation of other five critical vulnerabilities named CVE-2021-21101 and CVE-2021-21105 in Adobe Illustrator that may lead the arbitrary code execution in the context of the current user.<\/p><\/p>\n\n\n\n<p><strong>Summering Up<\/strong><\/p>\n\n\n\n<p><p style=\"text-align: justify\">These total 43 security flaws are resolved in Tuesday&#8217;s update and the users are advised to update the software installations while the latest version that transfers the risk associated with these vulnerabilities.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adobe is now going to release the patch on Tuesday that fixed various vulnerabilities linked with 12 different items and that also deals with zero-day flaws that affect the Adobe reader flaws that go wild and exploited. However, they also share the list of applications that deal with Adobe Experience Manager, Adobe InDesign, Adobe Illustrator, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1835,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Adobe is now going to release the patch on Tuesday that fixed various vulnerabilities linked with 12 different items and that also deals with zero-day flaws that affect the Adobe reader flaws that go wild and exploited. However, they also share the list of applications that deal with Adobe Experience Manager, Adobe InDesign, Adobe Illustrator, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-12T10:15:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T05:56:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/hackers-exploit-vulnerbilities-adobe-player-image-featured-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild!\",\"datePublished\":\"2021-05-12T10:15:34+00:00\",\"dateModified\":\"2021-06-07T05:56:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/\"},\"wordCount\":264,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/\",\"url\":\"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/\",\"name\":\"Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-05-12T10:15:34+00:00\",\"dateModified\":\"2021-06-07T05:56:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild! - Xiarch Solutions Private Limited","og_description":"Adobe is now going to release the patch on Tuesday that fixed various vulnerabilities linked with 12 different items and that also deals with zero-day flaws that affect the Adobe reader flaws that go wild and exploited. However, they also share the list of applications that deal with Adobe Experience Manager, Adobe InDesign, Adobe Illustrator, [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-05-12T10:15:34+00:00","article_modified_time":"2021-06-07T05:56:41+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/hackers-exploit-vulnerbilities-adobe-player-image-featured-image.png","type":"image\/png"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild!","datePublished":"2021-05-12T10:15:34+00:00","dateModified":"2021-06-07T05:56:41+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/"},"wordCount":264,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/","url":"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/","name":"Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-05-12T10:15:34+00:00","dateModified":"2021-06-07T05:56:41+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/hackers-exploit-adobe-reader-zero-day-vulnerability-in-the-wild\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1832"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1832"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1832\/revisions"}],"predecessor-version":[{"id":1836,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1832\/revisions\/1836"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1835"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}