CVE-2024-25648

8.8 HIGH

📋 TL;DR

A use-after-free vulnerability in Foxit Reader's ComboBox widget handling allows arbitrary code execution when users open malicious PDF files or visit malicious websites with the browser plugin enabled. This affects users running vulnerable versions of Foxit Reader, particularly those who open untrusted PDF documents or browse untrusted websites with the plugin active.

💻 Affected Systems

Products:
  • Foxit Reader
Versions: 2024.1.0.23997 and potentially earlier versions
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Browser plugin extension must be enabled for web-based exploitation; all default installations with JavaScript enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control of the affected system, enabling data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malware installation leading to data exfiltration, credential theft, or system disruption through typical phishing campaigns targeting PDF documents.

🟢

If Mitigated

No impact if users avoid opening untrusted PDFs, disable the browser plugin, or apply the security patch.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious PDF or visiting malicious site) but no authentication; JavaScript execution in PDF context is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.2 or later (check Foxit advisory for exact version)

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit Reader
2. Go to Help > Check for Updates
3. Follow prompts to download and install latest version
4. Restart Foxit Reader after installation

🔧 Temporary Workarounds

Disable JavaScript in Foxit Reader

all

Prevents malicious JavaScript from executing in PDF files

Open Foxit Reader > File > Preferences > Trust Manager > uncheck 'Enable JavaScript'

Disable Browser Plugin

all

Prevents web-based exploitation through malicious sites

Browser settings > Extensions/Add-ons > disable Foxit Reader plugin

🧯 If You Can't Patch

  • Use alternative PDF readers for untrusted documents
  • Implement application whitelisting to block Foxit Reader execution

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader version in Help > About; if version is 2024.1.0.23997 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where name="Foxit Reader" get version

Verify Fix Applied:

Verify version is 2024.2 or later after update; test with known safe PDF containing JavaScript.

📡 Detection & Monitoring

Log Indicators:

  • Foxit Reader crash logs with memory access violations
  • Unexpected JavaScript execution in PDF files
  • Process creation from Foxit Reader with suspicious parameters

Network Indicators:

  • Outbound connections from Foxit Reader process to unknown IPs
  • DNS requests for suspicious domains following PDF opening

SIEM Query:

process_name:"FoxitReader.exe" AND (event_id:1000 OR event_id:1001) OR process_name:"FoxitReader.exe" AND parent_process:"explorer.exe" AND cmdline:"*.pdf"

🔗 References

📤 Share & Export