The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-25961

CVE-2026-25961: SumatraPDF RCE Vulnerability

CVE-2026-25961 is a remote code execution flaw in SumatraPDF affecting versions 3.5.0 through 3.5.2. Attackers can exploit the insecure update mechanism to inject malicious installers and execute arbitrary code.

Published: February 13, 2026

CVE-2026-25961 Overview

SumatraPDF, a popular multi-format document reader for Windows, contains a critical vulnerability in its update mechanism. The software disables TLS hostname verification by using the INTERNET_FLAG_IGNORE_CERT_CN_INVALID flag and executes downloaded installers without performing signature verification checks. This combination of security flaws allows a network attacker possessing any valid TLS certificate (including freely available certificates from Let's Encrypt) to intercept update check requests, inject a malicious installer URL, and achieve arbitrary code execution on the victim's system.

Critical Impact

A man-in-the-middle attacker can exploit the disabled TLS hostname verification and missing signature checks to execute arbitrary code on systems running vulnerable SumatraPDF versions during the update process.

Affected Products

  • SumatraPDF version 3.5.0
  • SumatraPDF version 3.5.1
  • SumatraPDF version 3.5.2

Discovery Timeline

  • 2026-02-09 - CVE-2026-25961 published to NVD
  • 2026-02-10 - Last updated in NVD database

Technical Details for CVE-2026-25961

Vulnerability Analysis

This vulnerability (CWE-295: Improper Certificate Validation) represents a fundamental failure in secure software update implementation. The affected SumatraPDF versions disable critical TLS security mechanisms during the update check process by explicitly ignoring certificate Common Name (CN) validation. When combined with the absence of code signing verification for downloaded installers, this creates a complete bypass of the software's update integrity chain.

The attack requires a network position that allows interception of the update traffic, such as a compromised network, rogue access point, or DNS spoofing attack. Once positioned, an attacker can present any valid TLS certificate to establish a trusted connection with the victim's SumatraPDF client, then serve a malicious installer that will be executed without verification.

Root Cause

The root cause is the use of INTERNET_FLAG_IGNORE_CERT_CN_INVALID in the Windows Internet API (WinINet) calls that handle update checks. This flag instructs the system to accept TLS certificates even when the hostname doesn't match the certificate's Common Name or Subject Alternative Names. Additionally, the update mechanism lacks cryptographic signature verification for downloaded installer files, meaning any executable served by the attacker will be executed with the current user's privileges.

Attack Vector

The attack vector is network-based and requires user interaction (the user must trigger or accept an update). An attacker positioned in the network path between the victim and SumatraPDF's update servers can:

  1. Intercept the HTTPS update check request
  2. Present a valid TLS certificate for any domain (bypassing hostname verification)
  3. Respond with a modified update response containing a malicious installer URL
  4. Serve a trojanized installer when the victim proceeds with the update
  5. Achieve arbitrary code execution when the unsigned installer is executed

The vulnerability is particularly concerning because the attacker only needs any valid TLS certificate, not one specifically issued for SumatraPDF's domains. Free certificate authorities like Let's Encrypt make obtaining such certificates trivial.

Detection Methods for CVE-2026-25961

Indicators of Compromise

  • Unexpected network connections from SumatraPDF processes to IP addresses not associated with legitimate update servers
  • SumatraPDF update processes connecting to domains with recently issued or unusual TLS certificates
  • Downloaded installer files with mismatched or missing digital signatures in the user's temp directories
  • Execution of unsigned or unexpectedly signed executables following SumatraPDF update prompts

Detection Strategies

  • Monitor TLS certificate validation events and flag connections where hostname verification warnings are suppressed
  • Implement network detection rules for SumatraPDF update traffic to non-standard destinations
  • Deploy endpoint detection to identify unsigned executables launched by SumatraPDF processes
  • Use application whitelisting to prevent execution of untrusted installers

Monitoring Recommendations

  • Configure network monitoring to alert on SumatraPDF connections to IP addresses outside expected update infrastructure ranges
  • Enable process monitoring for child processes spawned by SumatraPDF, particularly installer or executable launches
  • Review Windows Application logs for certificate validation errors associated with SumatraPDF network activity

How to Mitigate CVE-2026-25961

Immediate Actions Required

  • Disable automatic updates in SumatraPDF settings until a patched version is available
  • Download SumatraPDF updates only from the official website (https://www.sumatrapdfreader.org) over a trusted network
  • Manually verify the digital signature of any downloaded SumatraPDF installer before execution
  • Consider using network segmentation to limit exposure of systems running vulnerable versions

Patch Information

Users should monitor the GitHub Security Advisory for patch availability and upgrade instructions. Upgrade to version 3.5.3 or later when available, which should implement proper TLS hostname verification and installer signature validation.

Workarounds

  • Disable automatic update checks in SumatraPDF: Settings → Options → Automatically check for updates (uncheck)
  • Use a trusted VPN when performing manual updates to reduce man-in-the-middle exposure
  • Block SumatraPDF from making outbound network connections via Windows Firewall or endpoint security tools
  • Implement application control policies to prevent execution of unsigned installers system-wide
bash
# Windows Firewall rule to block SumatraPDF network access (PowerShell as Administrator)
New-NetFirewallRule -DisplayName "Block SumatraPDF Outbound" -Direction Outbound -Program "C:\Program Files\SumatraPDF\SumatraPDF.exe" -Action Block

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechSumatrapdf

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-295
  • Technical References
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-25880: SumatraPDF RCE Vulnerability

  • CVE-2026-23512: SumatraPDF RCE Vulnerability

  • CVE-2026-25920: SumatraPDF Buffer Overflow Vulnerability

  • CVE-2026-23951: SumatraPDF DOS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English