CVE-2020-17412

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted U3D objects. It affects Foxit PhantomPDF users running version 10.0.0.35798, requiring user interaction to trigger the exploit through malicious files or web pages.

💻 Affected Systems

Products:
  • Foxit PhantomPDF
Versions: 10.0.0.35798
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with U3D object processing enabled (default configuration).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware installation on the victim's machine, with attackers using social engineering to deliver malicious PDFs via email or compromised websites.

🟢

If Mitigated

Limited impact with proper endpoint protection blocking malicious files, user training preventing suspicious file opens, and network segmentation containing any potential breach.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once a malicious PDF is opened.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.1 or later

Vendor Advisory: https://www.foxitsoftware.com/support/security-bulletins.php

Restart Required: Yes

Instructions:

1. Download latest version from Foxit website. 2. Run installer. 3. Restart system. 4. Verify version is 10.0.1 or higher.

🔧 Temporary Workarounds

Disable U3D object processing

windows

Prevent parsing of U3D objects in PDF files through registry modification

reg add "HKCU\Software\Foxit Software\PhantomPDF\10.0\General" /v "bEnableU3D" /t REG_DWORD /d 0 /f

Use alternative PDF viewer

all

Temporarily use a different PDF application until patching is complete

🧯 If You Can't Patch

  • Implement application whitelisting to block execution of unapproved PDF files
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious PDF processing behavior

🔍 How to Verify

Check if Vulnerable:

Check Help > About in Foxit PhantomPDF for version number - if version is exactly 10.0.0.35798, system is vulnerable.

Check Version:

wmic product where "name like 'Foxit PhantomPDF%'" get version

Verify Fix Applied:

Verify version is 10.0.1 or higher in Help > About, and test opening PDFs with U3D objects to ensure proper validation.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed PDF parsing attempts
  • Unexpected process creation from Foxit PhantomPDF
  • Memory access violations in application logs

Network Indicators:

  • Downloads of PDF files from suspicious sources
  • Outbound connections from Foxit processes to unknown IPs

SIEM Query:

process_name:"PhantomPDF.exe" AND (event_id:1000 OR event_id:1001) AND memory_violation:true

🔗 References

📤 Share & Export