Use-After-Free Vulnerability in Foxit Software's PDF Reader
CVE-2022-37332
Key Information:
- Vendor
- Foxit
- Status
- Vendor
- CVE Published:
- 21 November 2022
Badges
Summary
A use-after-free vulnerability has been identified in the JavaScript engine of Foxit Software's PDF Reader, specifically in version 12.0.1.12430. This vulnerability arises when a specially-crafted PDF file exploits the misuse of the media player API, enabling attackers to access previously freed memory. Successfully triggering this vulnerability allows an attacker to execute arbitrary code on the user's system. Users may inadvertently expose themselves to this risk by opening malicious PDF files or visiting harmful websites that leverage their browser's plugin extension.
Affected Version(s)
Foxit Reader 12.0.1.12430
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
7% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved