CVE-2024-47810

8.8 HIGH

📋 TL;DR

A use-after-free vulnerability in Foxit Reader 2024.3.0.26795 allows arbitrary code execution when processing malicious PDF files containing specially crafted JavaScript with 3D page objects. Attackers can exploit this by tricking users into opening malicious PDFs or visiting malicious websites with the browser plugin enabled. All users of the affected Foxit Reader version are at risk.

💻 Affected Systems

Products:
  • Foxit Reader
Versions: 2024.3.0.26795
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Browser plugin extension must be enabled for web-based exploitation. All default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user running Foxit Reader, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Malware installation or data exfiltration from the compromised system, often as part of targeted attacks or phishing campaigns.

🟢

If Mitigated

Limited impact with proper application sandboxing, memory protection mechanisms, and user privilege restrictions preventing full system takeover.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious PDF or visiting malicious site). The vulnerability is in JavaScript handling of 3D objects, which requires specific triggering conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.4.0 or later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Download latest Foxit Reader from official website. 2. Run installer. 3. Restart system. 4. Verify version is 2024.4.0 or higher.

🔧 Temporary Workarounds

Disable JavaScript in Foxit Reader

all

Prevents exploitation by disabling JavaScript execution in PDF files

Open Foxit Reader > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Disable Browser Plugin

all

Prevents web-based exploitation through browser

Browser extensions/settings > Disable Foxit Reader plugin

🧯 If You Can't Patch

  • Use alternative PDF readers that are not vulnerable
  • Implement application whitelisting to block Foxit Reader execution

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader version in Help > About. If version is 2024.3.0.26795 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where name="Foxit Reader" get version

Verify Fix Applied:

Verify version is 2024.4.0 or later in Help > About. Test opening PDFs with JavaScript to ensure functionality while checking for crashes.

📡 Detection & Monitoring

Log Indicators:

  • Foxit Reader crash logs with memory access violations
  • Unexpected process creation from Foxit Reader
  • JavaScript execution errors in application logs

Network Indicators:

  • Downloads of PDF files from suspicious sources
  • Outbound connections from Foxit Reader process to unknown IPs

SIEM Query:

process_name:"FoxitReader.exe" AND (event_id:1000 OR event_id:1001) AND exception_code:0xc0000005

🔗 References

📤 Share & Export