CVE-2023-38117

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Foxit PDF Reader's AcroForm Doc object handling that allows remote attackers to execute arbitrary code. Attackers can exploit it by tricking users into opening malicious PDF files or visiting malicious web pages. All users running vulnerable versions of Foxit PDF Reader are affected.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: Versions prior to 12.1.3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the standard desktop version of Foxit PDF Reader. Foxit PhantomPDF may also be affected but requires confirmation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer, enabling data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malware installation leading to data exfiltration, credential theft, or system disruption for individual users who open malicious PDFs.

🟢

If Mitigated

Limited impact with only the PDF reader process affected if sandboxing is enabled, though sandbox escape may still be possible.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) but no authentication. The vulnerability is well-documented and weaponization is likely given the CVSS score and RCE nature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.1.3 and later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit PDF Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 12.1.3 or later. 4. Restart the application.

🔧 Temporary Workarounds

Disable JavaScript in Foxit Reader

windows

Prevents JavaScript-based exploitation vectors that might trigger this vulnerability

File > Preferences > Security > Uncheck 'Enable JavaScript'

Use Protected View

windows

Open PDFs in protected/sandboxed mode to limit potential damage

File > Preferences > General > Check 'Open documents in Protected View'

🧯 If You Can't Patch

  • Temporarily switch to alternative PDF readers like Adobe Acrobat Reader or browser-based PDF viewers
  • Implement application whitelisting to block Foxit Reader execution until patched

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader version via Help > About. If version is below 12.1.3, the system is vulnerable.

Check Version:

wmic product where name="Foxit Reader" get version

Verify Fix Applied:

Verify version is 12.1.3 or higher in Help > About dialog.

📡 Detection & Monitoring

Log Indicators:

  • Foxit Reader crash logs with memory access violations
  • Unexpected child processes spawned from Foxit Reader

Network Indicators:

  • Outbound connections from Foxit Reader process to suspicious IPs
  • DNS requests for known malicious domains after PDF opening

SIEM Query:

process_name:"FoxitReader.exe" AND (event_id:1000 OR event_id:1001) AND exception_code:0xc0000005

🔗 References

📤 Share & Export