CVE-2025-9328
📋 TL;DR
This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PRC files. The flaw exists in PRC file parsing where improper data validation leads to out-of-bounds reads. All users running vulnerable versions of Foxit PDF Reader are affected.
💻 Affected Systems
- Foxit PDF Reader
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement.
Likely Case
Malicious actors deliver weaponized PRC files via email or web downloads, leading to malware installation or credential harvesting on individual workstations.
If Mitigated
Limited impact with proper endpoint protection, application sandboxing, and user awareness preventing successful exploitation.
🎯 Exploit Status
Exploitation requires user interaction but weaponization is likely given the RCE nature and ZDI publication. No public PoC confirmed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Foxit security bulletin for latest patched version
Vendor Advisory: https://www.foxit.com/support/security-bulletins.html
Restart Required: Yes
Instructions:
1. Open Foxit PDF Reader
2. Navigate to Help > Check for Updates
3. Follow prompts to install latest version
4. Restart application and system if prompted
🔧 Temporary Workarounds
Disable PRC file association
windowsRemove Foxit as default handler for .prc files to prevent automatic opening
Windows: Control Panel > Default Programs > Associate a file type or protocol with a program > Change .prc association
Application sandboxing
allRun Foxit PDF Reader in restricted mode or sandboxed environment
🧯 If You Can't Patch
- Implement application whitelisting to block unauthorized Foxit execution
- Deploy endpoint detection and response (EDR) with behavioral monitoring for process injection attempts
🔍 How to Verify
Check if Vulnerable:
Check Foxit version against vendor advisory. Vulnerable if using affected version range.
Check Version:
Windows: Open Foxit > Help > About Foxit PDF Reader
Verify Fix Applied:
Verify Foxit version is updated to patched version specified in vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Process creation events for Foxit PDF Reader with suspicious parent processes
- File access events for .prc files from untrusted sources
Network Indicators:
- Downloads of .prc files from unknown or suspicious domains
- Outbound connections from Foxit process to unknown IPs
SIEM Query:
process_name:"FoxitPDFReader.exe" AND file_extension:".prc" AND user_interaction:true