CVE-2024-30334

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Foxit PDF Reader's handling of Doc objects that allows remote attackers to execute arbitrary code when users open malicious PDF files or visit malicious web pages. It affects Foxit PDF Reader installations where users interact with untrusted PDF content.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: Specific affected versions not specified in provided references, but likely multiple recent versions prior to patch
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected Foxit PDF Reader versions are vulnerable when processing malicious PDF files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malware installation or data exfiltration from the compromised system, with attackers leveraging the foothold for further exploitation.

🟢

If Mitigated

Limited impact if systems are patched, users have limited privileges, and security controls prevent execution of malicious payloads.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file), but the vulnerability itself can be triggered without authentication. ZDI has confirmed the vulnerability exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Foxit security bulletins for specific patched versions

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Visit Foxit's security bulletins page
2. Identify the latest version that addresses CVE-2024-30334
3. Download and install the updated version
4. Restart the system to ensure complete patch application

🔧 Temporary Workarounds

Disable JavaScript in Foxit PDF Reader

all

Prevents exploitation vectors that rely on JavaScript execution within PDF files

Open Foxit PDF Reader > File > Preferences > Security > Uncheck 'Enable JavaScript'

Use Protected View

all

Open PDF files in protected/sandboxed mode to limit potential damage

Ensure 'Protected View' is enabled in Foxit security settings

🧯 If You Can't Patch

  • Restrict user privileges to prevent system-wide compromise if exploited
  • Implement application whitelisting to block unauthorized executables

🔍 How to Verify

Check if Vulnerable:

Check Foxit PDF Reader version against patched versions listed in Foxit security bulletins

Check Version:

Open Foxit PDF Reader > Help > About Foxit Reader

Verify Fix Applied:

Verify installed version is equal to or greater than the patched version specified in Foxit's advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Foxit Reader
  • Memory access violations or crash reports from Foxit processes
  • Unexpected network connections originating from Foxit Reader

Network Indicators:

  • Outbound connections to suspicious IPs/domains following PDF file opening
  • DNS requests for known malicious domains after PDF interaction

SIEM Query:

Process creation where parent_process contains 'foxit' AND (process contains 'cmd.exe' OR process contains 'powershell.exe' OR process contains suspicious executable names)

🔗 References

📤 Share & Export