CVE-2019-20822

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code on systems running vulnerable versions of Foxit Reader or PhantomPDF with the 3D Plugin Beta enabled. An out-of-bounds write via incorrect image data can lead to remote code execution. Users of Foxit Reader or PhantomPDF with the 3D Plugin Beta before version 9.7.0.29430 are affected.

💻 Affected Systems

Products:
  • Foxit Reader
  • Foxit PhantomPDF
Versions: All versions before 9.7.0.29430
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the 3D Plugin Beta to be installed and enabled. The vulnerability is in the plugin, not the core application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution, allowing attackers to install malware, steal data, or pivot to other systems.

🟠

Likely Case

Remote code execution leading to malware installation, data theft, or ransomware deployment on vulnerable systems.

🟢

If Mitigated

Limited impact if systems are patched, have application whitelisting, or run with minimal privileges.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a widely used plugin with a high CVSS score, making it attractive for exploitation. Proof-of-concept code has been published.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.7.0.29430 or later

Vendor Advisory: https://www.foxitsoftware.com/support/security-bulletins.php

Restart Required: Yes

Instructions:

1. Download the latest version from Foxit's official website. 2. Run the installer. 3. Restart the system to ensure all components are updated.

🔧 Temporary Workarounds

Disable 3D Plugin Beta

all

Remove or disable the vulnerable 3D Plugin Beta from Foxit Reader/PhantomPDF.

Navigate to Foxit installation directory, locate and remove the 3D plugin files or disable via application settings.

Application Whitelisting

windows

Use application whitelisting to block execution of Foxit Reader/PhantomPDF until patched.

Configure Windows AppLocker or similar tools to block Foxit executables.

🧯 If You Can't Patch

  • Isolate affected systems from the internet and restrict network access.
  • Run Foxit Reader/PhantomPDF with minimal user privileges and in a sandboxed environment.

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader/PhantomPDF version and verify if 3D Plugin Beta is installed. Version below 9.7.0.29430 with the plugin indicates vulnerability.

Check Version:

In Foxit Reader/PhantomPDF, go to Help > About to view version details.

Verify Fix Applied:

Confirm version is 9.7.0.29430 or later and the 3D Plugin Beta has been updated or removed.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected crashes of Foxit Reader/PhantomPDF
  • Process creation from Foxit executables with unusual parameters

Network Indicators:

  • Outbound connections from Foxit processes to unknown IPs
  • Download of suspicious files triggered by Foxit

SIEM Query:

Process creation where parent process contains 'foxit' and command line includes unusual arguments or network connections.

🔗 References

📤 Share & Export