Thursday, July 18, 2024
EHA

Foxit Reader Vulnerability Let Hackers Run Malicious Code via PDFs

Aleksander Nikolic, the security expert of Cisco Talos has recently detected a vulnerability that is continuously targeting the “Foxit Reader.”

However, Foxit has already published an update, so that they can close this severe vulnerability which is allowing attackers to exploit the PDFs to run malicious code remotely.  

The security experts have detected many security holes, but they are still investigating the whole matter. The specialists have named the vulnerability “CVE-2021-21822,” and they are still trying to find out the key details of this vulnerability.

This vulnerability is one of the high severity remote code execution, and it has been allowing the threat actors to implement malicious code on a user’s Windows computer remotely so that they can take control over the device.

After digging more about this vulnerability the analysts found that 650 million users from nearly 200 countries are currently using its reader.

Not only this but the list also includes large enterprise customers like Google, Intel, NASDAQ, Dell, Chevron, Asus, British Airways, HP, and Lenovo.

Flaw profile

  • CVE: CVE-2021-21822
  • CWE: CWE-416 – Use After Free
  • CVSS: 8.8
  • Severity: Critical

Users Exposed to RCE Attacks Due to’Use After Free’ Bug

The cybersecurity analyst, Aleksander Nikolic from Cisco Talos has detected this severe flaw through the “Use After Free” bug. 

Nikolic found this flaw in the V8 JavaScript engine, and this V8 engine is used by Foxit Reader to display the dynamic forms and communicative document elements.

Due to the improper handling of annotations by the Foxit Reader application and its browser extension this type of vulnerability occurs. And here the attacker takes the advantage of these annotations to craft malicious PDFs, that are later used to run an arbitrary code on the device.

More Bugs Were Fixed

This is not the first time when Foxit Reader gets attacked, as there are various other security bugs that are continuously attacking the former version of the  Foxit Reader.

All the security bugs were revealing users’ devices to the denial services, information disclosure, DLL hijacking, remote code execution, SQL injection, and many other security bugs.

Here are the security fixes that Foxit Reader has fixed in its 10.1.4 version:-

  • Memory Corruption vulnerability
  • Denial of Service vulnerability
  • Null Pointer Reference, Out-of-Bounds Read, Context Level Bypass, Type Confusion, or Buffer Overflow vulnerability 
  • Arbitrary File Deletion vulnerability
  • Deliver incorrect signature information
  • DLL Hijacking vulnerability
  • Read Remote Code Execution vulnerability
  • Information Disclosure vulnerability
  • Out-of-Bounds Write vulnerability
  • Arbitrary File Write Remote Code Execution vulnerability
  • SQL Injection Remote Code Execution vulnerability
  • Uninitialized Variable Information Disclosure vulnerability
  • Heap-based Buffer Overflow vulnerability

Recommendation

Apart from all these things, this vulnerability class the Foxit Reader 10.1.3.37598 as well as its former versions as well. And according to the report, it was being addressed with the release of Foxit Reader 10.1.4.37651.

However, the researchers have strongly recommended the users of Foxit Reader to immediately update their software with the new version. And to do so, you have to follow the simple steps that we have mentioned below:-

  • First, you have to open the app.
  • Then click on the “Check for Updates” in the app’s “Help” dialog.
  • That’s it, your update procedure will start.

So, following or implementing the above steps will provide greater security and consequently, the users will be able to keep themselves safe and secure from this kind of security bug.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Website

Latest articles

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...

Cybercriminals Exploit Attack on Donald Trump for Crypto Scams

Researchers at Bitdefender Labs remain ever-vigilant, informing users about the latest scams and internet...

New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites

HTTP Request Smuggling is a flaw in web security that is derived from variations...

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware

The Volcano Demon group has been discovered spreading a new ransomware called LukaLocker, which...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles