CVE-2021-38570

9.1 CRITICAL

📋 TL;DR

This vulnerability in Foxit Reader and PhantomPDF allows attackers to delete arbitrary files during uninstallation via symbolic link manipulation. It affects users running vulnerable versions of these PDF software applications on Windows systems. Attackers could exploit this to delete critical system or user files.

💻 Affected Systems

Products:
  • Foxit Reader
  • Foxit PhantomPDF
Versions: All versions before 10.1.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have local access and ability to create symbolic links, typically requiring administrative privileges on Windows systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete critical system files, causing system instability, data loss, or complete system compromise if key configuration files are removed.

🟠

Likely Case

Targeted deletion of user documents, configuration files, or application data leading to data loss and potential operational disruption.

🟢

If Mitigated

Limited impact with proper file permissions and user account controls, though local file deletion would still be possible.

🌐 Internet-Facing: LOW - This requires local access or social engineering to trigger uninstallation with malicious symlinks.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this, but requires specific uninstallation scenario.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access, ability to create symbolic links, and triggering uninstallation process with prepared symlinks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.1.4 and later

Vendor Advisory: https://www.foxitsoftware.com/support/security-bulletins.php

Restart Required: Yes

Instructions:

1. Download latest version from Foxit website. 2. Run installer. 3. Restart system. 4. Verify version is 10.1.4 or higher.

🔧 Temporary Workarounds

Restrict Symbolic Link Creation

windows

Configure Windows security policy to restrict who can create symbolic links

gpedit.msc -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> Create symbolic links

Monitor Uninstallation Events

windows

Set up monitoring for Foxit uninstallation processes and file deletion events

🧯 If You Can't Patch

  • Restrict user permissions to prevent creation of symbolic links in sensitive directories
  • Implement application control policies to prevent unauthorized uninstallation attempts

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader/PhantomPDF version in Help -> About. If version is below 10.1.4, system is vulnerable.

Check Version:

wmic product where "name like 'Foxit%'" get version

Verify Fix Applied:

Verify version is 10.1.4 or higher in Help -> About. Test that uninstallation no longer follows arbitrary symlinks.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Process creation for Foxit uninstaller
  • Security logs: File deletion events from Foxit processes
  • Application logs: Uninstallation events

Network Indicators:

  • No network indicators - local exploitation only

SIEM Query:

source="windows" (process_name="Foxit*uninstall*" OR process_name="Foxit*setup*") AND (event_id="4663" OR event_id="4656")

🔗 References

📤 Share & Export