Remote Code Execution Vulnerability in Foxit PDF Editor
CVE-2021-34962

7.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
7 May 2024

Summary

This vulnerability in Foxit PDF Editor arises from improper handling of Annotation objects, allowing for a use-after-free condition that can be exploited by remote attackers. To successfully launch an attack, the user must open a specially crafted file or navigate to a malicious web page. The flaw relates to the system's failure to validate the existence of an object prior to executing operations on it, potentially giving attackers the ability to run arbitrary code in the context of the affected application. Proper measures should be implemented to mitigate this risk, including the application of security patches and user education on safe file handling.

Affected Version(s)

PDF Editor 11.0.0.49893

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.