CVE-2026-3775

Published Apr 1, 2026

Last updated 12 days ago

Overview

Description
The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution.
Source
14984358-7092-470d-8f34-ade47a7658a2
NVD status
Awaiting Analysis

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

14984358-7092-470d-8f34-ade47a7658a2
CWE-427

Social media

Hype score
Not currently trending

References

Sources include official advisories and independent security research.