CVE-2022-37384

7.8 HIGH

📋 TL;DR

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visiting malicious web pages. The flaw exists in the delay method where object existence isn't validated before operations, enabling code execution in the current process context. Users of affected Foxit PDF Reader versions are at risk.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: 11.2.1.53537 and earlier versions
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. User interaction required (opening malicious file or visiting malicious page).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary code execution with user privileges, potentially leading to data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Malicious actors deliver malware or ransomware through phishing emails with malicious PDF attachments, compromising individual workstations.

🟢

If Mitigated

Limited impact with proper application sandboxing, least privilege execution, and network segmentation preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is straightforward once malicious content is delivered. ZDI-CAN-17327 reference suggests detailed analysis exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.2.2 and later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Download latest Foxit PDF Reader from official website. 2. Run installer. 3. Restart system if prompted. 4. Verify version is 11.2.2 or higher.

🔧 Temporary Workarounds

Disable JavaScript in Foxit Reader

all

Prevents exploitation by disabling JavaScript execution which is required for this vulnerability

Open Foxit Reader > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use Alternative PDF Viewer

all

Temporarily switch to a different PDF reader while waiting for patch deployment

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized PDF readers
  • Deploy network segmentation to isolate vulnerable systems and prevent lateral movement

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader version: Open Foxit Reader > Help > About Foxit Reader. If version is 11.2.1.53537 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where name="Foxit Reader" get version

Verify Fix Applied:

Verify version is 11.2.2 or higher in Help > About Foxit Reader. Test with known safe PDF files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Foxit Reader (foxitreader.exe)
  • Multiple PDF file openings from email attachments
  • Crash logs from Foxit Reader with memory access violations

Network Indicators:

  • Outbound connections from Foxit Reader process to unknown IPs
  • DNS requests for suspicious domains following PDF file access

SIEM Query:

process_name="foxitreader.exe" AND (parent_process="outlook.exe" OR parent_process="chrome.exe") AND process_command_line CONTAINS "*.pdf"

🔗 References

📤 Share & Export