Use-After-Free Vulnerability in Foxit Software's PDF Reader
CVE-2022-32774
8.8HIGH
Summary
A use-after-free vulnerability in the JavaScript engine of Foxit Software's PDF Reader allows attackers to exploit the software by crafting malicious PDF documents. When the user opens such a document, it can lead to memory reuse issues, enabling arbitrary code execution. Exploitation may also occur through a malicious website if the browser extension is active, posing significant security risks if users fall victim to such attacks.
Affected Version(s)
Foxit Reader 12.0.1.12430
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved