<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Installer — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/installer/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 01 Apr 2026 02:16:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/installer/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-3780: Local Privilege Escalation via Untrusted Search Path in Application Installer</title><link>https://feed.craftedsignal.io/briefs/2026-04-untrusted-search-path/</link><pubDate>Wed, 01 Apr 2026 02:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-untrusted-search-path/</guid><description>An application installer vulnerable to CVE-2026-3780 runs with elevated privileges but resolves system executables and DLLs using an untrusted search path, enabling local privilege escalation by allowing a local attacker to inject malicious binaries.</description><content:encoded><![CDATA[<p>CVE-2026-3780 describes a local privilege escalation vulnerability affecting an application installer. The installer, when executed, operates with elevated privileges. However, it resolves the location of system executables and DLLs using an untrusted search path. This untrusted path includes directories writable by standard users. An attacker can exploit this by placing malicious binaries, named identically to legitimate system files, in these user-writable directories. When the installer attempts to load or execute these system files, the attacker&rsquo;s malicious versions are used instead, due to the flawed search path resolution. This leads to arbitrary code execution with elevated privileges, thereby escalating the attacker&rsquo;s privileges on the local system. This vulnerability was reported in Foxit products and poses a significant risk to systems where the vulnerable installer is executed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a user-writable directory included in the application installer&rsquo;s search path.</li>
<li>The attacker analyzes the application installer to determine which system executables or DLLs it attempts to load or execute.</li>
<li>The attacker creates malicious binaries that mimic the names of the targeted system files.</li>
<li>The attacker places the malicious binaries into the user-writable directory.</li>
<li>The attacker executes the vulnerable application installer, typically requiring some user interaction (e.g., clicking &ldquo;Install&rdquo;).</li>
<li>The installer, running with elevated privileges, attempts to load or execute the legitimate system files.</li>
<li>Due to the untrusted search path, the installer loads or executes the attacker&rsquo;s malicious binaries instead of the legitimate ones.</li>
<li>The attacker&rsquo;s code executes with elevated privileges, allowing the attacker to perform actions such as creating new accounts, installing software, or modifying system settings, thereby achieving local privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3780 allows a local attacker to gain elevated privileges on the system. This means an attacker with limited access can perform administrative tasks, install malware, access sensitive data, and potentially compromise the entire system. The severity is high because it bypasses normal security controls and can lead to a full system compromise from a limited starting point. This poses a significant risk to any system running the affected application installer.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect DLL Hijacking via Installer&rdquo; to detect the creation of malicious DLLs in user-writable directories, referencing the rule details below.</li>
<li>Enable file creation monitoring in user-writable directories (e.g., %TEMP%, %APPDATA%) to provide data for the Sigma rule and to detect suspicious file activity.</li>
<li>Monitor process creation events for the execution of unexpected binaries within the context of the application installer, leveraging the rule &ldquo;Detect Suspicious Process Execution by Installer&rdquo; defined below.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>cve-2026-3780</category><category>untrusted-search-path</category><category>dll-hijacking</category><category>installer</category></item></channel></rss>