CVE-2023-27330

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Foxit PDF Reader's XFA annotation handling that allows remote code execution. Attackers can exploit it by tricking users into opening malicious PDF files, potentially taking full control of the affected system. All users running vulnerable versions of Foxit PDF Reader are affected.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: Versions prior to 12.1.2.15332
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability affects the core PDF rendering engine and requires no special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the logged-in user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malicious PDFs delivered via phishing emails or malicious websites execute arbitrary code, allowing attackers to steal credentials, install malware, or establish persistence on the victim's machine.

🟢

If Mitigated

With proper security controls, exploitation would be limited to the PDF reader's sandbox (if enabled) or blocked by application whitelisting, reducing impact to denial of service or limited data access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

While no public proof-of-concept exists, the vulnerability is well-documented and weaponization is likely given the prevalence of PDF-based attacks. User interaction (opening a malicious file) is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.1.2.15332 and later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit PDF Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to download and install version 12.1.2.15332 or later. 4. Restart the application.

🔧 Temporary Workarounds

Disable JavaScript in Foxit Reader

all

Prevents JavaScript-based exploitation vectors that might be used to trigger the vulnerability

File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use Protected View

windows

Opens PDFs in a restricted mode that prevents automatic code execution

File > Preferences > Trust Manager > Check 'Enable Safe Reading Mode'

🧯 If You Can't Patch

  • Use alternative PDF readers that are not vulnerable to this specific CVE
  • Implement application control policies to block execution of Foxit PDF Reader

🔍 How to Verify

Check if Vulnerable:

Open Foxit PDF Reader, go to Help > About Foxit Reader and check if version is below 12.1.2.15332

Check Version:

On Windows: "C:\Program Files\Foxit Software\Foxit PDF Reader\FoxitPDFReader.exe" --version

Verify Fix Applied:

Confirm version is 12.1.2.15332 or higher in Help > About Foxit Reader

📡 Detection & Monitoring

Log Indicators:

  • Foxit Reader crash logs with exception codes related to memory access violations
  • Windows Event Logs showing Foxit Reader process termination with abnormal exit codes

Network Indicators:

  • Downloads of PDF files from suspicious or untrusted sources
  • Outbound connections from Foxit Reader process to unknown IPs

SIEM Query:

process_name:"FoxitPDFReader.exe" AND (event_id:1000 OR event_id:1001) AND exception_code:0xc0000005

🔗 References

📤 Share & Export