FoxIT PDF Editor and Reader Multiple Vulnerabilities
Summary
CERT-FR published an advisory warning of 7 multiple vulnerabilities (CVE-2026-3774 through CVE-2026-3780) in FoxIT PDF Editor and Reader software. These vulnerabilities affect Windows and Mac versions prior to 13.2.3, 14.0.3, and 2026.1. Exploitation risks include arbitrary code execution, privilege escalation, data confidentiality breach, and denial of service. Organizations using affected products should update immediately.
What changed
CERT-FR issued advisory CERTFR-2026-AVI-0382 identifying 7 vulnerabilities (CVE-2026-3774 to CVE-2026-3780) in FoxIT PDF Editor and Reader products across multiple versions. Affected systems include PDF Editor for Mac (13.x before 13.2.3, 14.x before 14.0.3, versions before 2026.1), PDF Editor for Windows (13.x before 13.2.3, 14.x before 14.0.3, versions before 2026.1), and PDF Reader for Mac and Windows (versions before 2026.1). The vulnerabilities pose risks including arbitrary code execution, privilege elevation, data confidentiality breach, and denial of service.
Organizations should immediately identify FoxIT PDF Editor and Reader installations, update to patched versions (13.2.3+, 14.0.3+, or 2026.1+ as applicable), and verify successful patch application. Refer to the FoxIT security bulletin at foxitsoftware.com/support/security-bulletins.php for specific patch information.
What to do next
- Identify all FoxIT PDF Editor and Reader installations in your organization
- Update affected software to versions 13.2.3+, 14.0.3+, or 2026.1+ as applicable
- Verify patches are applied successfully and systems are no longer vulnerable
Archived snapshot
Mar 31, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Premier Ministre S.G.D.S.N
Agence nationale
de la sécurité des
systèmes d'information
Paris, le 31 mars 2026 N° CERTFR-2026-AVI-0382 Affaire suivie par: CERT-FR
Avis du CERT-FR
Objet: Multiples vulnérabilités dans les produits FoxIT
Gestion du document
| Référence | CERTFR-2026-AVI-0382 |
| Titre | Multiples vulnérabilités dans les produits FoxIT |
| Date de la première version | 31 mars 2026 |
| Date de la dernière version | 31 mars 2026 |
| Source(s) | Bulletin de sécurité FoxIT security-bulletins.php du 31 mars 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.
Risques
- Atteinte à la confidentialité des données
- Déni de service
- Exécution de code arbitraire
- Élévation de privilèges
Systèmes affectés
- PDF Editor pour Mac versions 13.x antérieures à 13.2.3
- PDF Editor pour Mac versions 14.x antérieures à 14.0.3
- PDF Editor pour Mac versions antérieures à 2026.1
- PDF Editor versions 13.x antérieures à 13.2.3
- PDF Editor versions 14.x antérieures à 14.0.3
- PDF Editor versions antérieures à 2026.1
- PDF Reader pour Mac versions antérieures à 2026.1
- PDF Reader versions antérieures à 2026.1
Résumé
De multiples vulnérabilités ont été découvertes dans les produits FoxIT. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Documentation
- Bulletin de sécurité FoxIT security-bulletins.php du 31 mars 2026
- https://www.foxitsoftware.com/support/security-bulletins.php
- Référence CVE CVE-2026-3774
- https://www.cve.org/CVERecord?id=CVE-2026-3774
- Référence CVE CVE-2026-3775
- https://www.cve.org/CVERecord?id=CVE-2026-3775
- Référence CVE CVE-2026-3776
- https://www.cve.org/CVERecord?id=CVE-2026-3776
- Référence CVE CVE-2026-3777
- https://www.cve.org/CVERecord?id=CVE-2026-3777
- Référence CVE CVE-2026-3778
- https://www.cve.org/CVERecord?id=CVE-2026-3778
- Référence CVE CVE-2026-3779
- https://www.cve.org/CVERecord?id=CVE-2026-3779
- Référence CVE CVE-2026-3780
- https://www.cve.org/CVERecord?id=CVE-2026-3780
Gestion détaillée du document
- le 31 mars 2026 Version initiale
Related changes
Get daily alerts for CERT-FR Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-FR.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-FR Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.