CVE-2024-30327

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Foxit PDF Reader's template handling that allows remote attackers to execute arbitrary code when users open malicious PDF files. It affects Foxit PDF Reader installations where users interact with untrusted documents. Attackers can leverage this to gain control of the affected system.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: Versions prior to 2024.1.0.23997
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability exists in the core PDF template handling functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's machine, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malware installation or data exfiltration from the compromised system, often as part of targeted attacks or phishing campaigns.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially containing the exploit to the PDF reader process.

🌐 Internet-Facing: MEDIUM - Requires user interaction (opening malicious file) but commonly exploited via phishing emails or malicious websites.
🏢 Internal Only: MEDIUM - Internal users opening malicious attachments or documents from compromised internal sources could still be affected.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction but no authentication. The vulnerability has been publicly disclosed through ZDI, increasing likelihood of weaponization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.1.0.23997 and later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit PDF Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 2024.1.0.23997 or later. 4. Restart the application.

🔧 Temporary Workarounds

Disable JavaScript in Foxit Reader

all

Prevents JavaScript-based exploitation vectors that might leverage this vulnerability

File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use Protected View

windows

Open untrusted PDFs in protected/sandboxed mode

File > Preferences > Trust Manager > Enable 'Safe Reading Mode'

🧯 If You Can't Patch

  • Restrict user privileges to prevent system-wide compromise if exploited
  • Implement application whitelisting to block unauthorized PDF reader execution

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader version: Open Foxit Reader > Help > About Foxit Reader. If version is below 2024.1.0.23997, system is vulnerable.

Check Version:

On Windows: wmic product where name="Foxit Reader" get version

Verify Fix Applied:

Verify version is 2024.1.0.23997 or higher in Help > About Foxit Reader.

📡 Detection & Monitoring

Log Indicators:

  • Foxit Reader crash logs with memory access violations
  • Unexpected child processes spawned from Foxit Reader

Network Indicators:

  • Outbound connections from Foxit Reader process to unknown IPs
  • DNS requests for suspicious domains after PDF opening

SIEM Query:

process_name:"FoxitReader.exe" AND (event_id:1000 OR event_id:1001) AND exception_code:0xc0000005

🔗 References

📤 Share & Export