CVE-2025-9328

7.8 HIGH

📋 TL;DR

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PRC files. The flaw exists in PRC file parsing where improper data validation leads to out-of-bounds reads. All users running vulnerable versions of Foxit PDF Reader are affected.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: Specific versions not detailed in advisory - check vendor bulletin for exact affected versions
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with PRC file handling enabled are vulnerable. Requires user interaction to open malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Malicious actors deliver weaponized PRC files via email or web downloads, leading to malware installation or credential harvesting on individual workstations.

🟢

If Mitigated

Limited impact with proper endpoint protection, application sandboxing, and user awareness preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction but weaponization is likely given the RCE nature and ZDI publication. No public PoC confirmed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Foxit security bulletin for latest patched version

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit PDF Reader
2. Navigate to Help > Check for Updates
3. Follow prompts to install latest version
4. Restart application and system if prompted

🔧 Temporary Workarounds

Disable PRC file association

windows

Remove Foxit as default handler for .prc files to prevent automatic opening

Windows: Control Panel > Default Programs > Associate a file type or protocol with a program > Change .prc association

Application sandboxing

all

Run Foxit PDF Reader in restricted mode or sandboxed environment

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized Foxit execution
  • Deploy endpoint detection and response (EDR) with behavioral monitoring for process injection attempts

🔍 How to Verify

Check if Vulnerable:

Check Foxit version against vendor advisory. Vulnerable if using affected version range.

Check Version:

Windows: Open Foxit > Help > About Foxit PDF Reader

Verify Fix Applied:

Verify Foxit version is updated to patched version specified in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for Foxit PDF Reader with suspicious parent processes
  • File access events for .prc files from untrusted sources

Network Indicators:

  • Downloads of .prc files from unknown or suspicious domains
  • Outbound connections from Foxit process to unknown IPs

SIEM Query:

process_name:"FoxitPDFReader.exe" AND file_extension:".prc" AND user_interaction:true

🔗 References

📤 Share & Export