Khaberni - Cybersecurity experts have issued an urgent warning to users of the "Adobe Reader" program, after discovering a serious Zero-Day vulnerability that has been exploited since late 2025, endangering millions of users with the risk of hacking simply by opening PDF files.
This vulnerability is one of the most dangerous types of security flaws because it is previously unknown or unfixed at the beginning of its exploitation, giving attackers a significant advantage in executing their attacks.
Requires no interaction
The most dangerous aspect of these attacks is that they require no complex interaction by the user. Merely opening a maliciously designed PDF file can initiate the hacking process.
Once the file is opened, the attackers can execute harmful commands on the device, including stealing data or even taking complete control of the system in some cases, via executing malicious code.
Widespread targeting
Reports indicate that the vulnerability affects users of both Windows and macOS systems, expanding the scope of the risk to include a large segment of users worldwide.
The nature of the attack depends on PDF files, which are among the most commonly used types of files, potentially increasing the likelihood of users being endangered via email or downloads from the internet.
Update within 72 hours
Adobe has urged users to install security updates as soon as they become available, emphasizing the necessity of updating within 72 hours to reduce the risk of exploitation.
Security experts confirm that ignoring these updates could leave devices vulnerable to advanced attacks that are difficult to detect, especially since some of these attacks are designed to operate discreetly without drawing the user's attention.
How can you protect yourself?
Experts recommend taking several precautionary measures, notably avoiding opening PDF files from unreliable sources and updating the Adobe Reader program immediately and using updated protection software.
This incident reaffirms that PDF files, despite their commonness, can be a dangerous means for cyber-attacks if not handled with caution.
Continuing threat
These attacks demonstrate that cyber threats are continuously evolving, and even commonly used and trusted software can become the target of sophisticated attacks.
As the exploitation of this vulnerability continues, user awareness and taking preventive actions remain the first line of defense against such attacks.



