Cyber Posture

CVE-2026-27271

High

Published: 10 March 2026

Published
10 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0003 8.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27271 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Adobe Illustrator. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 8.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification, reporting, and timely patching of flaws like the heap-based buffer overflow in vulnerable Adobe Illustrator versions to eliminate the vulnerability.

prevent

Implements memory safeguards such as ASLR and DEP that mitigate exploitation of heap buffer overflows even if the vulnerable software is not yet patched.

preventdetect

Deploys anti-malware protections to scan and block malicious Illustrator files crafted to trigger the buffer overflow before user interaction.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Heap buffer overflow enables arbitrary code execution upon opening a crafted malicious file in a client application, directly mapping to client-side exploitation (T1203) that requires user execution of the malicious file (T1204.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Illustrator versions 29.8.4, 30.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must…

more

open a malicious file.

Deeper analysisAI

CVE-2026-27271 is a heap-based buffer overflow vulnerability (CWE-122) affecting Adobe Illustrator versions 29.8.4, 30.1, and earlier. Published on 2026-03-10, the flaw could result in arbitrary code execution in the context of the current user, with a CVSS 3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H).

Exploitation requires user interaction, as a victim must open a malicious file in the affected Illustrator versions. Local attackers with no privileges can craft and deliver such files, potentially tricking users into opening them via social engineering or shared documents, leading to full arbitrary code execution with high impacts on confidentiality, integrity, and availability.

Adobe's security advisory APSB26-18 details the issue and mitigation steps, available at https://helpx.adobe.com/security/products/illustrator/apsb26-18.html.

Details

CWE(s)

Affected Products

adobe
illustrator
29.0 — 29.8.5 · 30.0 — 30.2

CVEs Like This One

CVE-2026-27272Same product: Adobe Illustrator
CVE-2026-27267Same product: Adobe Illustrator
CVE-2026-21362Same product: Adobe Illustrator
CVE-2026-27293Same product: Microsoft Windows
CVE-2026-21333Same product: Adobe Illustrator
CVE-2026-27238Same product: Microsoft Windows
CVE-2026-27310Same product: Microsoft Windows
CVE-2026-27312Same product: Microsoft Windows
CVE-2025-21159Same product: Adobe Illustrator
CVE-2025-27168Same product: Adobe Illustrator

References