CVE-2024-12751
📋 TL;DR
This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted AcroForms. The flaw is an out-of-bounds read due to improper input validation that can lead to remote code execution. All users of affected Foxit PDF Reader versions are at risk.
💻 Affected Systems
- Foxit PDF Reader
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement.
Likely Case
Malware installation, data exfiltration, or system disruption through crafted PDF files delivered via email or web downloads.
If Mitigated
Limited impact with proper application sandboxing, limited user privileges, and network segmentation preventing lateral movement.
🎯 Exploit Status
Exploitation requires user interaction but is straightforward once malicious PDF is opened. ZDI has confirmed the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2024.4.0.26318 or later
Vendor Advisory: https://www.foxit.com/support/security-bulletins.html
Restart Required: Yes
Instructions:
1. Open Foxit PDF Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 2024.4.0.26318 or newer. 4. Restart the application.
🔧 Temporary Workarounds
Disable JavaScript in Foxit Reader
windowsDisabling JavaScript reduces attack surface as many PDF exploits rely on JavaScript execution.
File > Preferences > JavaScript > Uncheck 'Enable JavaScript'
Use Protected View
windowsEnable Protected View to open PDFs in sandboxed environment.
File > Preferences > Trust Manager > Check 'Enable Protected View'
🧯 If You Can't Patch
- Restrict PDF file opening to trusted sources only via application control policies
- Implement network segmentation to limit lateral movement if exploitation occurs
🔍 How to Verify
Check if Vulnerable:
Check Foxit PDF Reader version in Help > About. If version is below 2024.4.0.26318, system is vulnerable.
Check Version:
wmic product where name="Foxit PDF Reader" get version
Verify Fix Applied:
Verify version is 2024.4.0.26318 or higher in Help > About after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from FoxitReader.exe
- Multiple PDF file access failures
- Crash logs from Foxit PDF Reader
Network Indicators:
- Unexpected outbound connections from FoxitReader.exe
- DNS requests to suspicious domains after PDF opening
SIEM Query:
process_name="FoxitReader.exe" AND (parent_process="explorer.exe" OR command_line CONTAINS "*.pdf")