<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-3779 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-3779/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 01 Apr 2026 02:16:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-3779/feed.xml" rel="self" type="application/rss+xml"/><item><title>Foxit Application Use-After-Free Vulnerability (CVE-2026-3779)</title><link>https://feed.craftedsignal.io/briefs/2026-04-foxit-uaf/</link><pubDate>Wed, 01 Apr 2026 02:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-foxit-uaf/</guid><description>CVE-2026-3779 is a use-after-free vulnerability in a Foxit application where stale references to page/form objects can lead to arbitrary code execution via crafted documents.</description><content:encoded><![CDATA[<p>CVE-2026-3779 is a use-after-free vulnerability affecting an unspecified Foxit application. The vulnerability stems from the application&rsquo;s list box calculate array logic, which improperly manages references to page or form objects. Specifically, when these objects are deleted or re-created, the calculation logic retains stale references. This flaw allows attackers to craft malicious documents that, upon calculation, trigger a use-after-free condition. Successful exploitation of this vulnerability could enable an attacker to execute arbitrary code within the context of the affected application. The vulnerability was reported on March 31, 2026 and poses a significant risk to users who handle untrusted documents with the vulnerable application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious document exploiting the list box calculation logic.</li>
<li>The user opens the document in a vulnerable Foxit application.</li>
<li>The application attempts to perform a list box calculation.</li>
<li>The stale reference within the list box calculate array logic is triggered.</li>
<li>The application attempts to access the deleted or re-created page/form object.</li>
<li>A use-after-free condition occurs, potentially corrupting memory.</li>
<li>The attacker leverages memory corruption to inject and execute arbitrary code.</li>
<li>The attacker gains control of the affected system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3779 can lead to arbitrary code execution on the victim&rsquo;s machine. The CVSS v3.1 score of 7.8 indicates a high severity. Exploitation requires user interaction (opening a malicious document), limiting the scope somewhat. However, targeted spearphishing campaigns could deliver such malicious documents, impacting organizations that rely on the vulnerable Foxit application for document handling. The consequences include potential data theft, system compromise, and further propagation of malicious activity within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for unusual child processes spawned by the Foxit application, using the process creation rule provided below.</li>
<li>Apply the security updates released by Foxit as outlined in their security bulletin to remediate CVE-2026-3779 (<a href="https://www.foxit.com/support/security-bulletins.html)">https://www.foxit.com/support/security-bulletins.html)</a>.</li>
<li>Educate users about the risks of opening documents from untrusted sources to reduce the likelihood of initial access via social engineering (T1566).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-3779</category><category>use-after-free</category><category>code-execution</category><category>foxit</category></item></channel></rss>