CVE-2022-30557

7.5 HIGH

📋 TL;DR

Foxit PDF Reader and PDF Editor versions before 11.2.2 contain a type confusion vulnerability during JavaScript execution that can cause application crashes. Attackers could potentially exploit this to execute arbitrary code by tricking users into opening malicious PDF files. This affects all users running vulnerable versions of Foxit PDF software.

💻 Affected Systems

Products:
  • Foxit PDF Reader
  • Foxit PDF Editor
Versions: All versions before 11.2.2
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with JavaScript enabled (default configuration).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the current user, potentially leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crash (denial of service) with potential for limited code execution in the context of the PDF reader process.

🟢

If Mitigated

Application crash only, with no code execution due to sandboxing or other security controls.

🌐 Internet-Facing: MEDIUM - Requires user interaction (opening malicious PDF) but commonly occurs via email attachments or web downloads.
🏢 Internal Only: MEDIUM - Similar risk profile as internet-facing; depends on user behavior and PDF file handling practices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open malicious PDF. Type confusion vulnerabilities often lead to memory corruption that can be leveraged for code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.2.2 and later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit PDF software. 2. Go to Help > Check for Updates. 3. Follow prompts to download and install version 11.2.2 or later. 4. Restart the application.

🔧 Temporary Workarounds

Disable JavaScript in Foxit

all

Prevents JavaScript execution in PDF files, which mitigates this vulnerability.

Open Foxit > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use alternative PDF viewer

all

Temporarily use a different PDF reader that is not affected by this vulnerability.

🧯 If You Can't Patch

  • Disable JavaScript in Foxit PDF software
  • Implement application whitelisting to block execution of Foxit PDF Reader/Editor
  • Use network/web filtering to block PDF downloads from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check Foxit PDF version: Open Foxit > Help > About Foxit PDF Reader/Editor. If version is below 11.2.2, you are vulnerable.

Check Version:

On Windows: wmic product where name="Foxit PDF Reader" get version

Verify Fix Applied:

Confirm version is 11.2.2 or higher in Help > About, and verify JavaScript is disabled if using workaround.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs from Foxit processes
  • Unexpected JavaScript execution in PDF files
  • Process creation from Foxit PDF executable

Network Indicators:

  • PDF file downloads from suspicious sources
  • HTTP requests from Foxit processes to unusual domains

SIEM Query:

source="*foxit*" AND (event_type="crash" OR process_name="FoxitPDFReader.exe")

🔗 References

📤 Share & Export