Tuesday, April 1, 2025
HomeCyber Security NewsFoxit PDF Editor Vulnerabilities Allows Remote Code Execution

Foxit PDF Editor Vulnerabilities Allows Remote Code Execution

Published on

SIEM as a Service

Follow Us on Google News

Foxit Software has issued critical security updates for its widely used PDF solutions, Foxit PDF Reader and Foxit PDF Editor.

The updates—Foxit PDF Reader 2024.4 and Foxit PDF Editor 2024.4/13.1.5—were released on December 17, 2024, to counter vulnerabilities that could leave users exposed to remote code execution (RCE) attacks.

Details of the Vulnerabilities

The security flaws addressed in this update include Use-After-Free vulnerabilities in the handling of certain elements, such as AcroForms, checkbox objects, and 3D page objects.

Exploiting these flaws could allow an attacker to execute arbitrary code remotely on a victim’s system. These vulnerabilities are tracked under the following identifiers:

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

The flaws were reported by Mat Powell of Trend Micro Zero Day Initiative (ZDI) and KPC of Cisco Talos, both of whom disclosed that the issues stem from improper memory validation, such as the use of wild or null pointers.

Exploitation could result in application crashes or, in the worst-case scenario, permit malicious actors to take control of affected systems.

The vulnerabilities specifically impact Foxit PDF Reader and Editor software running on Windows operating systems.

No reports have yet confirmed active exploitation of these vulnerabilities in the wild, but due to the critical nature of these flaws, users are strongly encouraged to update immediately.

Foxit strongly advises all users of its PDF Reader and Editor software to upgrade to the latest version to mitigate these vulnerabilities.

To update the software, users running Version 2023.1 or higher should open Foxit PDF Reader or Foxit PDF Editor, navigate to the “Help” menu, and select “About Foxit PDF Reader” or “About Foxit PDF Editor.”

From there, they can click on “Check for Update” to install the latest version. For those using Version 13 of Foxit PDF Editor, the process is similar.

Open the application, go to the “Help” menu, select “About Foxit PDF Editor,” and click on “Check for Update.”Alternatively, users can download the updated version directly from Foxit’s official website to ensure they are running the most secure and stable release of the software.

Alternatively, users can download the updated versions directly from Foxit’s official website.

Given the potential for attackers to exploit these vulnerabilities and execute remote code, it is imperative for users to update their Foxit applications immediately. Keeping software current is one of the most effective measures to safeguard against cyber threats.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide



Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Plantronics Hub Flaw Allows Attackers to Gain Elevated Privileges

A critical vulnerability has been identified in the Plantronics Hub software, a client application...

HijackLoader Evolves with New Modules for Stealth and Malware Analysis Evasion

HijackLoader, a malware loader first identified in 2023, has undergone significant evolution with the...

Massive 400GB X (Twitter) Data Leaked – 2.8 Billion Records Exposed

A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has...

PortSwigger Launches Burp AI to Enhance Penetration Testing with AI

PortSwigger, the makers of Burp Suite, has taken a giant leap forward in the...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Plantronics Hub Flaw Allows Attackers to Gain Elevated Privileges

A critical vulnerability has been identified in the Plantronics Hub software, a client application...

HijackLoader Evolves with New Modules for Stealth and Malware Analysis Evasion

HijackLoader, a malware loader first identified in 2023, has undergone significant evolution with the...

Massive 400GB X (Twitter) Data Leaked – 2.8 Billion Records Exposed

A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has...