CVE-2025-9325

5.5 MEDIUM

📋 TL;DR

This vulnerability in Foxit PDF Reader allows attackers to read memory beyond allocated bounds when parsing malicious PRC files, potentially disclosing sensitive information. Users who open malicious PDF files or visit compromised websites are affected. The vulnerability requires user interaction but could be combined with other exploits for code execution.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: Specific affected versions not specified in provided references, check Foxit advisory for details
Operating Systems: Windows, macOS, Linux - all platforms where Foxit PDF Reader runs
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected Foxit PDF Reader versions are vulnerable when processing PRC files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure combined with other vulnerabilities could lead to arbitrary code execution in the current user context, potentially compromising the entire system.

🟠

Likely Case

Sensitive memory contents disclosure including passwords, keys, or other application data, potentially enabling further attacks.

🟢

If Mitigated

Limited information disclosure with no code execution due to proper sandboxing and exploit mitigations.

🌐 Internet-Facing: MEDIUM - Requires user interaction but malicious files could be delivered via web downloads or email attachments.
🏢 Internal Only: MEDIUM - Similar risk internally as users could open malicious files from network shares or internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious file. Information disclosure alone may not be sufficient for full compromise without additional vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Foxit security bulletin for specific patched version

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: No

Instructions:

1. Visit Foxit security bulletins page. 2. Identify the specific advisory for CVE-2025-9325. 3. Download and install the latest version of Foxit PDF Reader. 4. Verify installation completes successfully.

🔧 Temporary Workarounds

Disable PRC file handling

all

Configure Foxit PDF Reader to not process PRC files or use alternative PDF viewers for PRC content

User education and restrictions

all

Train users to avoid opening PDF files from untrusted sources and implement application whitelisting

🧯 If You Can't Patch

  • Implement application control to block execution of Foxit PDF Reader
  • Use alternative PDF readers that don't support PRC file format

🔍 How to Verify

Check if Vulnerable:

Check Foxit PDF Reader version against affected versions listed in Foxit security advisory

Check Version:

In Foxit PDF Reader: Help → About Foxit Reader (Windows) or Foxit Reader → About Foxit Reader (macOS)

Verify Fix Applied:

Verify installed Foxit PDF Reader version is equal to or higher than patched version specified in advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing PDF files
  • Unusual memory access patterns in application logs

Network Indicators:

  • Downloads of PDF files from suspicious sources
  • Unusual outbound connections after PDF file opening

SIEM Query:

EventID=1000 OR EventID=1001 Source="Foxit Reader" AND Keywords="Exception" OR "Access Violation"

🔗 References

📤 Share & Export