CVE-2023-38111
📋 TL;DR
This is a use-after-free vulnerability in Foxit PDF Reader's annotation handling that allows remote attackers to execute arbitrary code when a user opens a malicious PDF file or visits a malicious webpage. It affects users of Foxit PDF Reader who open untrusted documents. The vulnerability exists due to improper validation of annotation objects before performing operations on them.
💻 Affected Systems
- Foxit PDF Reader
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining the same privileges as the PDF Reader process, potentially leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Local privilege escalation or arbitrary code execution within the context of the PDF Reader process, potentially allowing data exfiltration or installation of additional malware.
If Mitigated
Application crash or denial of service if exploit fails, with potential for limited data exposure depending on sandboxing effectiveness.
🎯 Exploit Status
User interaction required (opening malicious PDF). The vulnerability was discovered by Zero Day Initiative (ZDI-CAN-21025) and has been publicly disclosed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 12.1.3 and later
Vendor Advisory: https://www.foxit.com/support/security-bulletins.html
Restart Required: Yes
Instructions:
1. Open Foxit PDF Reader
2. Go to Help > Check for Updates
3. Follow prompts to download and install version 12.1.3 or later
4. Restart the application
🔧 Temporary Workarounds
Disable JavaScript in Foxit Reader
allPrevents JavaScript-based exploitation vectors
Open Foxit Reader > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'
Use Protected View
allOpen untrusted PDFs in protected/sandboxed mode
Open Foxit Reader > File > Preferences > Trust Manager > Check 'Enable Safe Reading Mode'
🧯 If You Can't Patch
- Use alternative PDF readers for opening untrusted documents
- Implement application whitelisting to block Foxit Reader execution
🔍 How to Verify
Check if Vulnerable:
Check Foxit Reader version in Help > About. If version is below 12.1.3, the system is vulnerable.
Check Version:
On Windows: wmic product where "name like 'Foxit%Reader%'" get version
Verify Fix Applied:
Verify version is 12.1.3 or higher in Help > About. Test with known safe PDF files to ensure functionality.
📡 Detection & Monitoring
Log Indicators:
- Application crashes of Foxit Reader
- Unusual process creation from Foxit Reader
- Multiple failed annotation operations in application logs
Network Indicators:
- Unexpected outbound connections from Foxit Reader process
- Downloads of PDF files from suspicious sources
SIEM Query:
process_name:"FoxitReader.exe" AND (event_id:1000 OR event_id:1001) OR process_parent_name:"FoxitReader.exe" AND process_name NOT IN (allowed_list)