CVE-2024-41605

8.4 HIGH

📋 TL;DR

This vulnerability allows attackers to replace legitimate Foxit PDF update files with malicious executables via side-loading attacks, enabling arbitrary code execution on affected systems. It affects Foxit PDF Reader and PDF Editor users running vulnerable versions, primarily those with automatic updates enabled.

💻 Affected Systems

Products:
  • Foxit PDF Reader
  • Foxit PDF Editor
Versions: Foxit PDF Reader before 2024.3; Foxit PDF Editor before 2024.3 and 13.x before 13.1.4
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with automatic updates enabled are most vulnerable. Manual update processes may also be affected if updater files are manipulated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining administrative privileges, data exfiltration, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Malware installation leading to credential theft, data loss, or system instability requiring remediation.

🟢

If Mitigated

Limited impact with proper network segmentation and endpoint protection blocking malicious payloads.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access or ability to manipulate update files in transit. Side-loading attacks are well-documented and relatively easy to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Foxit PDF Reader 2024.3; Foxit PDF Editor 2024.3 or 13.1.4

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Download latest version from official Foxit website. 2. Run installer with administrative privileges. 3. Restart system after installation completes. 4. Verify update integrity through application settings.

🔧 Temporary Workarounds

Disable Automatic Updates

all

Prevent automatic update downloads that could be intercepted and replaced.

In Foxit: File > Preferences > Update > Uncheck 'Automatically check for updates'

Network Segmentation for Update Traffic

all

Restrict and monitor network traffic to Foxit update servers.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized executables from running
  • Use endpoint detection and response (EDR) solutions to monitor for suspicious update-related activities

🔍 How to Verify

Check if Vulnerable:

Check Foxit version in Help > About. If version is below 2024.3 for Reader, or below 2024.3/13.1.4 for Editor, system is vulnerable.

Check Version:

On Windows: wmic product where name like "Foxit%" get version

Verify Fix Applied:

Confirm version is 2024.3 or higher for Reader, or 2024.3/13.1.4 or higher for Editor. Verify update integrity validation is functioning.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Foxit update processes
  • Suspicious file writes to Foxit installation directories
  • Failed integrity checks in application logs

Network Indicators:

  • Unusual outbound connections from Foxit processes
  • Downloads from non-Foxit update servers

SIEM Query:

process_name:"FoxitUpdater.exe" AND (network_destination_ip NOT IN [foxit_update_servers])

🔗 References

📤 Share & Export