CVE-2024-30359

7.8 HIGH

📋 TL;DR

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted 3D objects in AcroForms. The flaw is an out-of-bounds read that can lead to remote code execution in the context of the current user. All users running vulnerable versions of Foxit PDF Reader are affected.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: Specific vulnerable versions not provided in CVE description; check Foxit security bulletins for exact ranges.
Operating Systems: Windows, macOS, Linux (if Foxit Reader is installed)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects the AcroForm 3D object handling component. All standard installations with vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution with user privileges, potentially leading to data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Malicious actor gains code execution on user's workstation, enabling credential theft, data exfiltration, or installation of additional malware.

🟢

If Mitigated

Attack fails due to patched software, application sandboxing, or user not opening malicious PDF.

🌐 Internet-Facing: HIGH - Attackers can host malicious PDFs on websites or send via email, requiring only user interaction.
🏢 Internal Only: MEDIUM - Risk exists if users open malicious PDFs from internal sources, but attack surface is smaller than internet-facing.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (opening malicious PDF) but no authentication. ZDI advisory suggests weaponization is likely given the RCE nature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Foxit security bulletins for specific patched versions

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Visit Foxit security bulletins page. 2. Identify latest patched version for your product. 3. Download and install update. 4. Restart system if prompted.

🔧 Temporary Workarounds

Disable JavaScript in Foxit Reader

all

Disabling JavaScript may prevent some exploitation vectors, though not guaranteed for all attack methods.

Open Foxit Reader > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use alternative PDF viewer

all

Temporarily use a different PDF reader until Foxit is patched.

🧯 If You Can't Patch

  • Restrict PDF file opening to trusted sources only via email filtering and web proxy policies.
  • Implement application allowlisting to prevent unauthorized PDF readers from executing.

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader version against vulnerable versions listed in Foxit security bulletins.

Check Version:

Open Foxit Reader > Help > About Foxit Reader

Verify Fix Applied:

Verify installed version matches or exceeds patched version from Foxit advisory.

📡 Detection & Monitoring

Log Indicators:

  • Process creation events from Foxit Reader with unusual command-line arguments
  • Crash logs from Foxit Reader processes

Network Indicators:

  • Downloads of PDF files from suspicious sources followed by unusual outbound connections

SIEM Query:

Process:foxitreader.exe AND (ParentProcess:explorer.exe OR CommandLine:*pdf*) | stats count by host

🔗 References

📤 Share & Export