Critical Zero-Days Hit Chrome, Adobe Reader, HPE Networks - featured image
Security

Critical Zero-Days Hit Chrome, Adobe Reader, HPE Networks

A wave of critical security vulnerabilities has emerged across major software platforms, with Google Chrome, Adobe Reader, and HPE networking equipment all requiring immediate patches to address actively exploited zero-day flaws.

Adobe Reader Under Active Attack

Adobe has released emergency security updates to address a critical vulnerability in Acrobat Reader that cybercriminals are actively exploiting in the wild. The flaw, tracked as CVE-2026-34621, carries a severe CVSS score of 8.6 out of 10.0 and enables attackers to execute arbitrary code on vulnerable systems.

Security researchers confirm that this zero-day vulnerability has been exploited for months before Adobe’s patch release, highlighting the extended exposure window that organizations faced. The vulnerability allows malicious actors to run unauthorized code on affected installations, potentially compromising sensitive data and system integrity.

Chrome 146 Patches Dual Zero-Days

Google has addressed two actively exploited zero-day vulnerabilities in Chrome 146, marking another significant security milestone for the widely-used browser. These flaws enable attackers to manipulate data and bypass critical security restrictions, potentially leading to remote code execution on victim machines.

The dual vulnerabilities demonstrate the ongoing targeting of browser platforms by threat actors, who continue to identify and exploit weaknesses in web-based applications. Users are strongly advised to update to Chrome 146 immediately to protect against these known exploits.

HPE Network Infrastructure at Risk

A critical vulnerability affecting HPE AOS-CX networking equipment allows unauthorized attackers to reset administrator passwords remotely without any authentication. This flaw poses severe risks to network infrastructure security, as it completely circumvents existing authentication controls.

The vulnerability’s remote exploitation capability makes it particularly dangerous for organizations relying on HPE networking hardware, as attackers could potentially gain administrative access to critical network infrastructure components.

Immediate Action Required

Security teams should prioritize patching these vulnerabilities immediately, given their active exploitation status. The combination of zero-day exploits across multiple platforms underscores the critical importance of maintaining up-to-date security patches and implementing robust vulnerability management programs.

Organizations should verify that all Chrome browsers are updated to version 146, Adobe Reader installations have received the latest security patches, and HPE AOS-CX devices are protected through available firmware updates.

Sources

Alex Kim

Alex Kim is a certified cybersecurity specialist with over 12 years of experience in threat intelligence and security research. Previously a penetration tester at major financial institutions, Alex now focuses on making cybersecurity news accessible while maintaining technical depth.