CVE-2022-24357

8.8 HIGH

📋 TL;DR

CVE-2022-24357 is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code when users open malicious PDF files or visit malicious web pages. The vulnerability exists in Annotation object handling where the software fails to validate object existence before operations. All users of affected Foxit PDF Reader versions are at risk.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: 11.1.0.52543 and earlier versions
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability requires user interaction to open malicious PDF files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary code execution with current user privileges, potentially leading to data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Malicious actors deliver weaponized PDFs via phishing campaigns to execute malware, steal credentials, or establish persistence on victim systems.

🟢

If Mitigated

With proper controls, exploitation attempts are blocked by security software, sandboxing, or user awareness preventing malicious file execution.

🌐 Internet-Facing: HIGH - Attackers can host malicious PDFs on websites or deliver via email attachments to any internet-connected user.
🏢 Internal Only: MEDIUM - Internal phishing campaigns or shared malicious documents could exploit this, but requires user interaction.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once malicious PDF is opened. ZDI-CAN-15743 tracking suggests active research.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Foxit PDF Reader 11.1.1 or later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit PDF Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to install latest version. 4. Alternatively, download and install latest version from Foxit website. 5. Restart system after installation.

🔧 Temporary Workarounds

Disable JavaScript in Foxit Reader

all

Prevents JavaScript-based exploitation vectors in PDF files

Open Foxit Reader > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use Protected View

windows

Open PDFs in sandboxed protected mode

Open Foxit Reader > File > Preferences > General > Check 'Open cross-domain PDF files in Protected Mode'

🧯 If You Can't Patch

  • Block PDF files from untrusted sources at email gateways and web proxies
  • Use application whitelisting to prevent unauthorized PDF reader execution

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader version: Open Foxit Reader > Help > About Foxit Reader. If version is 11.1.0.52543 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where name="Foxit Reader" get version

Verify Fix Applied:

Verify version is 11.1.1 or later in Help > About Foxit Reader. Test with known safe PDF files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Foxit Reader crash logs with memory access violations
  • Unexpected child processes spawned from Foxit Reader
  • Multiple failed PDF file openings

Network Indicators:

  • Downloads of PDF files from suspicious domains
  • Outbound connections from Foxit Reader process to unknown IPs

SIEM Query:

process_name:"FoxitReader.exe" AND (event_id:1000 OR event_id:1001) AND exception_code:0xc0000005

🔗 References

📤 Share & Export