CVE-2022-24955

9.8 CRITICAL

📋 TL;DR

CVE-2022-24955 is a DLL hijacking vulnerability in Foxit PDF software that allows attackers to execute arbitrary code by placing malicious DLL files in directories searched by the application. This affects users of Foxit PDF Reader and Foxit PDF Editor on Windows systems. Successful exploitation requires the attacker to trick a user into opening a malicious file or accessing a compromised directory.

💻 Affected Systems

Products:
  • Foxit PDF Reader
  • Foxit PDF Editor
Versions: All versions before 11.2.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows OS where DLL search path behavior is exploitable. Linux and macOS versions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user running Foxit software, potentially leading to ransomware deployment, data theft, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or arbitrary code execution in the context of the current user, allowing attackers to steal documents, install malware, or move laterally within the network.

🟢

If Mitigated

Limited impact if user runs with minimal privileges, application is sandboxed, or proper file permissions prevent DLL placement in vulnerable directories.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening a file or accessing a directory). DLL hijacking techniques are well-documented and weaponization is likely given the high CVSS score.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.2.1 and later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Download Foxit PDF Reader/Editor version 11.2.1 or later from official Foxit website. 2. Run the installer. 3. Follow installation prompts. 4. Restart the application and any related services.

🔧 Temporary Workarounds

Restrict DLL search path

windows

Use Windows policies or application settings to restrict DLL loading to trusted directories only

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

Remove vulnerable versions

windows

Uninstall vulnerable Foxit versions and use alternative PDF software until patched

appwiz.cpl
Select Foxit PDF Reader/Editor and click Uninstall

🧯 If You Can't Patch

  • Run Foxit software with minimal user privileges (not as administrator)
  • Implement application whitelisting to prevent execution of unauthorized DLLs

🔍 How to Verify

Check if Vulnerable:

Check Foxit version via Help > About. If version is below 11.2.1, the system is vulnerable.

Check Version:

wmic product where name="Foxit PDF Reader" get version

Verify Fix Applied:

Verify version is 11.2.1 or higher in Help > About dialog.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual directories
  • Process creation events for suspicious DLLs loaded by Foxit processes

Network Indicators:

  • Unusual outbound connections from Foxit processes post-exploitation

SIEM Query:

source="Windows Security" AND event_id=4688 AND process_name="Foxit*.exe" AND parent_process_name NOT IN ("explorer.exe", "cmd.exe")

🔗 References

📤 Share & Export