The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution.
References
| Link | Resource |
|---|---|
| https://www.foxit.com/support/security-bulletins.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
14 Apr 2026, 17:56
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Foxit
Microsoft windows Microsoft Foxit pdf Reader Foxit pdf Editor |
|
| CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:* |
|
| References | () https://www.foxit.com/support/security-bulletins.html - Vendor Advisory |
01 Apr 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-01 02:16
Updated : 2026-04-14 17:56
NVD link : CVE-2026-3775
Mitre link : CVE-2026-3775
CVE.ORG link : CVE-2026-3775
JSON object : View
Products Affected
microsoft
- windows
foxit
- pdf_editor
- pdf_reader
CWE
CWE-427
Uncontrolled Search Path Element
