CVE-2022-37377

7.8 HIGH

📋 TL;DR

This vulnerability in Foxit PDF Editor allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visiting malicious web pages. The flaw exists in JavaScript optimization code, leading to type confusion that enables code execution. Users of Foxit PDF Editor 11.1.1.53537 are affected.

💻 Affected Systems

Products:
  • Foxit PDF Editor
Versions: 11.1.1.53537
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: User interaction required (opening malicious PDF or visiting malicious webpage). All Windows installations with this version are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, data theft, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Malware installation, credential theft, and data exfiltration from the compromised system.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only affecting the PDF editor process.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction but no authentication. Type confusion vulnerabilities are commonly weaponized in PDF-based attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.2.0 or later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Download latest version from Foxit website. 2. Run installer. 3. Restart system. 4. Verify update in Help > About.

🔧 Temporary Workarounds

Disable JavaScript in Foxit PDF Editor

windows

Prevents exploitation by disabling JavaScript execution in PDF files

Open Foxit PDF Editor > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use alternative PDF viewer

all

Temporarily use a different PDF application that is not vulnerable

🧯 If You Can't Patch

  • Restrict user permissions to prevent code execution at system level
  • Implement application whitelisting to block unauthorized executables

🔍 How to Verify

Check if Vulnerable:

Check Foxit PDF Editor version in Help > About menu

Check Version:

Not applicable - check via GUI in Help > About

Verify Fix Applied:

Verify version is 11.2.0 or higher in Help > About

📡 Detection & Monitoring

Log Indicators:

  • Unusual Foxit PDF Editor process behavior
  • Suspicious child processes spawned from Foxit
  • Multiple PDF file openings from untrusted sources

Network Indicators:

  • Outbound connections from Foxit process to suspicious IPs
  • DNS requests for known malicious domains after PDF opening

SIEM Query:

process_name:"FoxitPDFEditor.exe" AND (process_child_count > 3 OR network_connection_count > 5)

🔗 References

📤 Share & Export