CVE-2025-32451

8.8 HIGH

📋 TL;DR

A memory corruption vulnerability in Foxit Reader allows arbitrary code execution when users open malicious PDF files containing specially crafted JavaScript. Attackers can exploit this by tricking users into opening malicious files or visiting malicious websites with the browser plugin enabled. This affects all users of vulnerable Foxit Reader versions.

💻 Affected Systems

Products:
  • Foxit Reader
Versions: 2025.1.0.27937 and earlier versions
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Browser plugin extension increases attack surface when enabled. All default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's machine, enabling data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Malware installation leading to data exfiltration, credential theft, or system disruption for individual users who open malicious PDFs.

🟢

If Mitigated

Limited impact with proper application sandboxing, memory protection mechanisms, and user awareness preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file or visiting malicious site). Memory corruption vulnerabilities typically require some exploit development effort.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.1.0.27938 or later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to download and install latest version. 4. Restart Foxit Reader after installation completes.

🔧 Temporary Workarounds

Disable JavaScript in Foxit Reader

all

Prevents JavaScript execution in PDF files, blocking the attack vector

Open Foxit Reader > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Disable Browser Plugin

all

Prevents exploitation through malicious websites

Browser settings > Extensions/Add-ons > Disable Foxit Reader plugin

🧯 If You Can't Patch

  • Use alternative PDF readers that are not vulnerable
  • Implement application whitelisting to block Foxit Reader execution

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader version in Help > About. If version is 2025.1.0.27937 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where name="Foxit Reader" get version

Verify Fix Applied:

Verify version is 2025.1.0.27938 or later in Help > About after applying update.

📡 Detection & Monitoring

Log Indicators:

  • Foxit Reader crash logs with memory access violations
  • Unexpected JavaScript execution in PDF files
  • Process creation from Foxit Reader with unusual parameters

Network Indicators:

  • Outbound connections from Foxit Reader process to unknown IPs
  • DNS requests for suspicious domains following PDF opening

SIEM Query:

process_name:"FoxitReader.exe" AND (event_id:1000 OR event_id:1001) AND (exception_code:0xc0000005 OR exception_code:0xc0000409)

🔗 References

📤 Share & Export