CVE-2022-37387

7.8 HIGH

📋 TL;DR

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted AcroForms. The flaw exists due to improper validation of objects before performing operations on them, leading to use-after-free conditions. All users of affected Foxit PDF Reader versions are at risk.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: 11.2.2.53575 and earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: User interaction required (opening malicious PDF file or visiting malicious webpage).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malicious code execution in the context of the current user, allowing file system access, credential harvesting, and installation of additional malware.

🟢

If Mitigated

Limited impact if user runs with minimal privileges, application sandboxing is enabled, and network segmentation prevents lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction but no authentication. The vulnerability is publicly documented with technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.2.3 or later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit PDF Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to download and install version 11.2.3 or later. 4. Restart the application.

🔧 Temporary Workarounds

Disable JavaScript in Foxit Reader

windows

Prevents exploitation by disabling JavaScript execution which may be required for the attack chain.

File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use Protected View

windows

Open PDFs in Protected View mode to limit potential damage from malicious files.

File > Preferences > General > Check 'Open documents in Protected View'

🧯 If You Can't Patch

  • Restrict user privileges to prevent system-wide compromise if exploited
  • Implement application whitelisting to block unauthorized executables from running

🔍 How to Verify

Check if Vulnerable:

Check Help > About Foxit Reader and verify version is 11.2.2.53575 or earlier.

Check Version:

wmic product where name="Foxit Reader" get version

Verify Fix Applied:

Verify version is 11.2.3 or later in Help > About Foxit Reader.

📡 Detection & Monitoring

Log Indicators:

  • Process crashes of FoxitReader.exe
  • Unusual child processes spawned from FoxitReader.exe
  • Memory access violations in application logs

Network Indicators:

  • Unexpected outbound connections from Foxit Reader process
  • Downloads of PDF files from suspicious sources

SIEM Query:

process_name="FoxitReader.exe" AND (event_id=1000 OR event_id=1001) OR parent_process="FoxitReader.exe" AND process_creation=true

🔗 References

📤 Share & Export