CVE-2026-3775
EUVD-2026-1775101.04.2026, 02:16
The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| foxit | pdf_editor | 𝑥 ≤ 13.2.2.24014 |
| foxit | pdf_editor | 14.0.0.33046 ≤ 𝑥 ≤ 14.0.2.33402 |
| foxit | pdf_editor | 2023.1.0.15510 ≤ 𝑥 ≤ 2023.3.0.23028 |
| foxit | pdf_editor | 2024.1.0.23997 ≤ 𝑥 ≤ 2024.4.1.27687 |
| foxit | pdf_editor | 2025.1.0.27937 ≤ 𝑥 ≤ 2025.3.0.35737 |
| foxit | pdf_reader | 𝑥 ≤ 2025.3.0.35737 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration