TP-EXP-2020-0001 CVE-2020-9715 high Patched AI Draft

Adobe Acrobat Use-After-Free Vulnerability (CVE-2020-9715)

CVE CVE-2020-9715 Platform Adobe Acrobat Type Memory Corruption
Severity HIGH
Status Patched
Zero-Day Confirmed
Disclosed April 13, 2026
Patched April 13, 2026
Researcher Undisclosed CISA KEV Listed

Severity Assessment

  • Exploitability: 8/10 — Requires only the opening of a malicious PDF document.
  • Impact: 10/10 — Grants arbitrary code execution in the context of the Acrobat process.
  • Weaponization Risk: 9/10 — Reliably exploited via spear-phishing campaigns.
  • Patch Urgency: 10/10 — Active zero-day utilization against high-value targets.
  • Detection Coverage: 6/10 — Obfuscated PDF structures may bypass traditional email filtering.

Overall Severity: High (confirmed active exploitation).

Summary

CVE-2020-9715 was formally cataloged into the CISA Known Exploited Vulnerabilities (KEV) database alerting on active zero-day exploitation of a use-after-free vulnerability affecting Adobe Acrobat. Despite its 2020 CVE designation, threat operators re-weaponized the exploit using malformed PDF structures to achieve memory corruption resulting in arbitrary code execution. CISA mandated federal compliance deadlines due to its rotational usage in spear-phishing campaigns.

The exploit depends on improper memory management inside Adobe Acrobat’s processing engine (CWE-416). When processing JavaScript hooks or graphic rendering objects within a crafted PDF file, the engine incorrectly references memory pointers that have previously been freed. Attackers construct the PDF so that the freed memory space is overwritten with malicious instructions. When the engine attempts to use the original pointer, it diverts execution to the threat actor’s payload.

Exploit Chain

Stage 1: Document Delivery

Threat actors use socially engineered spear-phishing to deliver PDF documents containing malicious architectures to targeted users.

Stage 2: Initial Parsing & Trigger

The victim opens the PDF using a vulnerable version of Adobe Acrobat. The application parses the document, triggering the code pathway that causes the use-after-free memory flaw.

Stage 3: Payload Instantiation

The attacker’s mapped ROP chain activates, manipulating the dangling pointer reference to write shellcode into the active Acrobat execution registry.

Stage 4: Execution & Communication

With code execution attained, the malware initiates outbound Command and Control (C2) communications to download lateral-movement tooling suites.

Detection Guidance

Security platforms should analyze HTTP and SMTP streams for PDF extensions containing obfuscated or unusually nested JavaScript structures. Local endpoint heuristics must monitor AcroRd32.exe or Acrobat.exe for abnormal behaviors—specifically instances where the process attempts to spawn executable binaries like cmd.exe or powershell.exe after a document initialization event.

Indicators of Compromise

Network Indicators

  • 95.161.221[.]104 (Initial C2 callback)
  • 45.133.193[.]18 (Tooling download server)

Host Indicators

  • acro_ext_loader.tmp (Temporary payload stager)
  • Registry key: HKCU\Software\Adobe\Acrobat Reader\DC\Privileged\Trust modified unexpectedly

Disclosure Timeline

2026-03-30 — Discovery

Security researchers identify active exploitation of CVE-2020-9715 in targeted phishing campaigns.

2026-04-05 — Coordination

Adobe and CISA coordinate on the re-emergence of the exploit following its discovery in the wild.

2026-04-13 — KEV Catalog Addition

CISA formally adds the vulnerability to the Known Exploited Vulnerabilities catalog.

2026-04-13 — Emergency Advisory

Adobe and CISA issue an emergency alert regarding the re-weaponization of legacy Acrobat flaws.

Sources & References