Use-After-Free Vulnerability in Foxit Software's PDF Reader
CVE-2022-37332

8.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
21 November 2022

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A use-after-free vulnerability has been identified in the JavaScript engine of Foxit Software's PDF Reader, specifically in version 12.0.1.12430. This vulnerability arises when a specially-crafted PDF file exploits the misuse of the media player API, enabling attackers to access previously freed memory. Successfully triggering this vulnerability allows an attacker to execute arbitrary code on the user's system. Users may inadvertently expose themselves to this risk by opening malicious PDF files or visiting harmful websites that leverage their browser's plugin extension.

Affected Version(s)

Foxit Reader 12.0.1.12430

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

7% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.