CVE-2024-32488

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on Windows systems by placing malicious DLL files in the Foxit PDF update-service folder due to weak permissions. It affects Foxit PDF Reader and Editor users with versions before 2024.1. Attackers need local access to the system to exploit this flaw.

💻 Affected Systems

Products:
  • Foxit PDF Reader
  • Foxit PDF Editor
Versions: All versions before 2024.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Requires local access to the system. The update-service folder has weak permissions allowing DLL planting.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains SYSTEM/administrator privileges, enabling complete system compromise, data theft, malware installation, and persistence.

🟠

Likely Case

Local user or malware with limited privileges escalates to administrator rights to install additional malware or access restricted resources.

🟢

If Mitigated

With proper folder permissions and user privilege restrictions, exploitation requires administrative access to place DLLs, making attack unlikely.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local system access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Malicious insiders or malware with local access can exploit this to gain elevated privileges on affected workstations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to write to the update-service folder. DLL planting attacks are well-understood techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.1 or later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Download Foxit PDF Reader/Editor 2024.1 or later from official website. 2. Run installer with administrative privileges. 3. Restart system after installation completes.

🔧 Temporary Workarounds

Restrict update-service folder permissions

windows

Modify folder permissions to prevent unauthorized users from writing DLL files to the update-service directory.

icacls "C:\Program Files\Foxit Software\Foxit PDF Reader\update-service" /deny Users:(OI)(CI)W
icacls "C:\Program Files (x86)\Foxit Software\Foxit PDF Reader\update-service" /deny Users:(OI)(CI)W

Disable Foxit update service

windows

Stop and disable the Foxit update service to prevent DLL loading from the vulnerable folder.

sc stop FoxitReaderUpdateService
sc config FoxitReaderUpdateService start= disabled

🧯 If You Can't Patch

  • Remove write permissions for non-administrative users from the Foxit update-service folder.
  • Implement application whitelisting to prevent execution of unauthorized DLLs from the update-service directory.

🔍 How to Verify

Check if Vulnerable:

Check Foxit version via Help > About. If version is below 2024.1, system is vulnerable. Also check folder permissions on update-service directory.

Check Version:

wmic product where "name like 'Foxit%'" get version

Verify Fix Applied:

Verify installed version is 2024.1 or higher via Help > About. Check that update-service folder has proper permissions restricting write access.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from Foxit update-service folder by non-standard processes
  • File creation events in Foxit update-service directory by non-administrative users

Network Indicators:

  • Unusual outbound connections from Foxit processes post-update check

SIEM Query:

source="Windows Security" event_id=4688 process_name="Foxit*.exe" command_line="*update-service*" OR file_path="*update-service*"

🔗 References

📤 Share & Export