CVE-2022-37391

7.8 HIGH

📋 TL;DR

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visiting malicious web pages. The flaw exists in how AcroForms handle objects without proper validation, enabling code execution in the current process context. Users of Foxit PDF Reader 11.2.2.53575 are affected.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: 11.2.2.53575 and earlier versions
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable version are affected regardless of configuration. User interaction required (opening malicious file or visiting malicious page).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through remote code execution, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malicious actors deliver targeted attacks via phishing emails with malicious PDF attachments, compromising individual workstations and establishing footholds in networks.

🟢

If Mitigated

With proper security controls like application whitelisting, network segmentation, and user training, impact is limited to isolated incidents with minimal data exposure.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once malicious content is delivered. ZDI-CAN-17661 reference suggests detailed technical analysis exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.2.3 or later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Download latest version from Foxit website. 2. Run installer. 3. Restart system. 4. Verify version is 11.2.3 or higher.

🔧 Temporary Workarounds

Disable JavaScript in Foxit Reader

all

Prevents JavaScript-based exploitation vectors in PDF files

Open Foxit Reader > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use Protected View

all

Opens PDFs in sandboxed mode to limit potential damage

Open Foxit Reader > File > Preferences > Trust Manager > Check 'Enable Safe Reading Mode'

🧯 If You Can't Patch

  • Implement application control/whitelisting to block unauthorized PDF readers
  • Deploy network segmentation to limit lateral movement from compromised endpoints

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader version: Open Foxit Reader > Help > About Foxit Reader. If version is 11.2.2.53575 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where name="Foxit Reader" get version

Verify Fix Applied:

Verify version is 11.2.3 or higher using same About dialog. Test with known safe PDF files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Foxit Reader process spawning unexpected child processes
  • Unusual network connections from Foxit Reader process
  • Crash logs from Foxit Reader with memory corruption indicators

Network Indicators:

  • Outbound connections from Foxit Reader to suspicious domains
  • PDF file downloads from untrusted sources followed by process execution

SIEM Query:

process_name:"FoxitReader.exe" AND (process_child_name:("cmd.exe","powershell.exe","wscript.exe") OR network_destination_ip:(malicious_ips))

🔗 References

📤 Share & Export