CVE-2020-8870
📋 TL;DR
This vulnerability in Foxit Studio Photo allows remote attackers to execute arbitrary code by tricking users into opening malicious TIF files. The flaw exists in the GetTIFPalette method where improper data validation enables out-of-bounds reads that can lead to code execution. Users of Foxit Studio Photo 3.6.6.916 are affected.
💻 Affected Systems
- Foxit Studio Photo
📦 What is this software?
Foxit Studio Photo by Foxitsoftware
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via remote code execution with user privileges, potentially leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Attacker gains code execution in the context of the current user, enabling data exfiltration, credential theft, and installation of additional malware.
If Mitigated
Limited impact with proper application sandboxing and user privilege restrictions, potentially only crashing the application.
🎯 Exploit Status
Exploitation requires user interaction but is straightforward once malicious file is opened. ZDI advisory suggests reliable exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to version 3.6.6.917 or later
Vendor Advisory: https://www.foxitsoftware.com/support/security-bulletins.php
Restart Required: Yes
Instructions:
1. Open Foxit Studio Photo
2. Go to Help > Check for Updates
3. Follow prompts to install latest version
4. Restart application
🔧 Temporary Workarounds
Disable TIF file association
windowsPrevent Foxit Studio Photo from automatically opening TIF files
Control Panel > Default Programs > Associate a file type or protocol with a program > Change .tif/.tiff to another application
Application sandboxing
windowsRun Foxit Studio Photo in restricted environment
🧯 If You Can't Patch
- Uninstall Foxit Studio Photo 3.6.6.916 completely
- Implement strict email/web filtering to block TIF files
- Educate users not to open TIF files from untrusted sources
🔍 How to Verify
Check if Vulnerable:
Check Help > About in Foxit Studio Photo for version 3.6.6.916
Check Version:
wmic product where name="Foxit Studio Photo" get version
Verify Fix Applied:
Verify version is 3.6.6.917 or higher in Help > About
📡 Detection & Monitoring
Log Indicators:
- Application crashes with TIF file processing
- Unusual process creation from FoxitStudioPhoto.exe
- Memory access violations in application logs
Network Indicators:
- Downloads of TIF files from suspicious sources
- Outbound connections from Foxit Studio Photo to unknown IPs
SIEM Query:
process_name="FoxitStudioPhoto.exe" AND (event_id=1000 OR event_id=1001) AND file_extension=".tif"