Cyber Posture

CVE-2026-27267

High

Published: 10 March 2026

Published
10 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0003 8.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27267 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Adobe Illustrator. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 8.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the stack-based buffer overflow vulnerability in Adobe Illustrator by requiring timely application of vendor patches from APSB26-18.

prevent

Implements memory protections like stack canaries, ASLR, and DEP to block arbitrary code execution from stack-based buffer overflows.

detect

Supports vulnerability scanning to identify systems with vulnerable Adobe Illustrator versions 29.8.4, 30.1, and earlier.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Stack-based buffer overflow in client app (Illustrator) triggered by malformed file directly enables T1203 (Exploitation for Client Execution) and T1204.002 (Malicious File) for arbitrary code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Illustrator versions 29.8.4, 30.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must…

more

open a malicious file.

Deeper analysisAI

CVE-2026-27267 is a stack-based buffer overflow vulnerability (CWE-121) affecting Adobe Illustrator versions 29.8.4, 30.1, and earlier. Published on 2026-03-10, this flaw could result in arbitrary code execution in the context of the current user when processing malformed files.

Exploitation requires local access (AV:L) and user interaction (UI:R), with low attack complexity (AC:L) and no privileges needed (PR:N). An attacker can trick a victim into opening a malicious file, triggering the buffer overflow and achieving high-impact confidentiality, integrity, and availability effects (C:H/I:H/A:H) within the user's scope (S:U). The CVSS v3.1 base score is 7.8.

Adobe's security bulletin APSB26-18, available at https://helpx.adobe.com/security/products/illustrator/apsb26-18.html, details mitigations and patches for this vulnerability.

Details

CWE(s)

Affected Products

adobe
illustrator
29.0 — 29.8.5 · 30.0 — 30.2

CVEs Like This One

CVE-2026-27272Same product: Adobe Illustrator
CVE-2026-27271Same product: Adobe Illustrator
CVE-2026-21362Same product: Adobe Illustrator
CVE-2025-27168Same product: Adobe Illustrator
CVE-2025-21163Same product: Adobe Illustrator
CVE-2026-21333Same product: Adobe Illustrator
CVE-2025-21159Same product: Adobe Illustrator
CVE-2025-27169Same product: Adobe Illustrator
CVE-2026-27295Same product: Microsoft Windows
CVE-2026-27296Same product: Microsoft Windows

References