CVE-2025-9326

7.8 HIGH

📋 TL;DR

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PRC files. The flaw exists in PRC file parsing where improper data validation enables out-of-bounds reads that can lead to remote code execution. All users of affected Foxit PDF Reader versions are at risk.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: Specific affected versions not specified in advisory - check vendor bulletin for exact ranges
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. Requires user interaction to open malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer, enabling data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Local privilege escalation leading to malware installation, credential theft, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Application crash or denial of service if exploit attempts are blocked by security controls, though some data leakage may still occur.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once malicious file is opened. ZDI has confirmed the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Foxit security bulletin for specific patched version

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Visit Foxit's security bulletins page
2. Download latest version of Foxit PDF Reader
3. Install update following vendor instructions
4. Restart system if prompted

🔧 Temporary Workarounds

Disable PRC file handling

windows

Remove or modify file associations to prevent PRC files from opening in Foxit Reader

Windows: assoc .prc=
Windows: ftype PRCFile=

Use application control

all

Block execution of Foxit Reader via application whitelisting

🧯 If You Can't Patch

  • Implement network segmentation to limit lateral movement from compromised systems
  • Deploy endpoint detection and response (EDR) solutions to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader version against vendor's security bulletin for affected versions

Check Version:

Windows: Open Foxit Reader > Help > About; macOS/Linux: Check application info or package manager

Verify Fix Applied:

Verify installed version matches or exceeds patched version listed in Foxit advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of Foxit Reader
  • Unusual process creation from Foxit Reader
  • Memory access violations in application logs

Network Indicators:

  • Downloads of PRC files from untrusted sources
  • Outbound connections from Foxit Reader process

SIEM Query:

process_name:"FoxitReader.exe" AND (event_id:1000 OR event_id:1001) OR file_extension:".prc"

🔗 References

📤 Share & Export