CVE-2022-28682

7.8 HIGH

📋 TL;DR

This is a remote code execution vulnerability in Foxit PDF Reader that allows attackers to execute arbitrary code by tricking users into opening malicious PDF files or visiting malicious web pages. The vulnerability exists in how the software handles Doc objects in JavaScript, enabling attackers to read past allocated memory boundaries and gain code execution in the current process context.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: 11.2.1.53537 and earlier versions
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with vulnerable versions are affected. The vulnerability requires user interaction to trigger.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malware installation, credential theft, or data exfiltration from the compromised system, often as part of targeted attacks or phishing campaigns.

🟢

If Mitigated

Limited impact with proper application sandboxing, endpoint protection, and user awareness preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once the malicious file is opened. The vulnerability was discovered by Zero Day Initiative (ZDI-CAN-16778).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.2.2 and later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit PDF Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to download and install version 11.2.2 or later. 4. Restart the application.

🔧 Temporary Workarounds

Disable JavaScript in Foxit Reader

all

Prevents exploitation by disabling JavaScript execution in PDF files

Open Foxit Reader > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use Protected View

all

Opens PDFs in sandboxed mode to limit potential damage

Open Foxit Reader > File > Preferences > General > Check 'Enable Safe Reading Mode'

🧯 If You Can't Patch

  • Disable Foxit Reader as default PDF handler and use alternative PDF viewers
  • Implement application whitelisting to block Foxit Reader execution

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader version in Help > About. If version is 11.2.1.53537 or earlier, the system is vulnerable.

Check Version:

On Windows: wmic product where name='Foxit Reader' get version

Verify Fix Applied:

Verify version is 11.2.2 or later in Help > About. Test opening known safe PDF files with JavaScript content.

📡 Detection & Monitoring

Log Indicators:

  • Foxit Reader crash logs with memory access violations
  • Unexpected child processes spawned from Foxit Reader
  • Network connections initiated by Foxit Reader process

Network Indicators:

  • Outbound connections from Foxit Reader to unknown IPs
  • DNS requests for suspicious domains from PDF reader process

SIEM Query:

process_name='FoxitReader.exe' AND (event_id=1000 OR event_id=1001) AND description CONTAINS 'access violation'

🔗 References

📤 Share & Export