CVE-2022-24363

8.8 HIGH

📋 TL;DR

CVE-2022-24363 is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code when users open malicious PDF files or visit malicious web pages. This affects users of Foxit PDF Reader version 11.1.0.52543 who open untrusted PDF documents.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: 11.1.0.52543
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of the affected version are vulnerable regardless of configuration settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the PDF Reader process, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Malware installation or data exfiltration when users open malicious PDFs from phishing emails or compromised websites.

🟢

If Mitigated

Limited impact if PDF Reader runs with restricted privileges and users avoid opening untrusted documents.

🌐 Internet-Facing: HIGH - Attackers can host malicious PDFs on websites or distribute via email attachments.
🏢 Internal Only: MEDIUM - Risk exists if users open malicious PDFs from internal sources, but requires user interaction.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (opening malicious PDF) but the vulnerability is well-documented and weaponization is likely given the high CVSS score and public details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.1.1 or later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit PDF Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to install latest version. 4. Restart computer after installation.

🔧 Temporary Workarounds

Disable JavaScript in PDF Reader

all

Prevents exploitation via malicious JavaScript in PDF files

In Foxit Reader: File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use Protected View

all

Open PDFs in sandboxed mode to limit potential damage

In Foxit Reader: File > Preferences > Trust Manager > Check 'Enable Safe Reading Mode'

🧯 If You Can't Patch

  • Uninstall Foxit PDF Reader 11.1.0.52543 and use alternative PDF viewers
  • Implement application whitelisting to block execution of vulnerable Foxit Reader version

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader version: Open Foxit Reader > Help > About Foxit Reader. If version is 11.1.0.52543, system is vulnerable.

Check Version:

On Windows: wmic product where name="Foxit Reader" get version

Verify Fix Applied:

Verify version is 11.1.1 or later in Help > About Foxit Reader.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of Foxit Reader
  • Unusual process creation from Foxit Reader
  • Memory access violations in application logs

Network Indicators:

  • Outbound connections from Foxit Reader to suspicious domains
  • Downloads of PDF files from untrusted sources

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="FoxitReader.exe" AND Version="11.1.0.52543"

🔗 References

📤 Share & Export