CVE-2020-17418

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by exploiting a buffer overflow in Foxit Studio Photo's EZIX file handling. Attackers can achieve this by tricking users into opening malicious EZIX files or visiting malicious web pages. Users of Foxit Studio Photo 3.6.6.922 are affected.

💻 Affected Systems

Products:
  • Foxit Studio Photo
Versions: 3.6.6.922
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of the affected version are vulnerable by default when processing EZIX files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malware installation leading to data exfiltration, credential theft, or system disruption for individual users who open malicious files.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash without code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once malicious file is opened.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later versions than 3.6.6.922

Vendor Advisory: https://www.foxitsoftware.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Download latest version from Foxit website
2. Uninstall current version
3. Install updated version
4. Restart system

🔧 Temporary Workarounds

Disable EZIX file association

windows

Remove EZIX file type association with Foxit Studio Photo to prevent automatic opening

Control Panel > Default Programs > Associate a file type or protocol with a program > Select .ezix > Change program > Choose different application

Application sandboxing

windows

Run Foxit Studio Photo in restricted environment

🧯 If You Can't Patch

  • Block EZIX files at network perimeter and email gateways
  • Implement application whitelisting to prevent unauthorized execution

🔍 How to Verify

Check if Vulnerable:

Check Help > About in Foxit Studio Photo for version 3.6.6.922

Check Version:

Not applicable - check via application GUI

Verify Fix Applied:

Verify installed version is newer than 3.6.6.922 in Help > About

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected process creation from Foxit Studio Photo

Network Indicators:

  • Downloads of EZIX files from untrusted sources
  • Outbound connections after opening EZIX files

SIEM Query:

Process creation where parent_process contains 'FoxitStudioPhoto.exe' AND command_line contains '.ezix'

🔗 References

📤 Share & Export