Use-After-Free Vulnerability in Foxit Software's PDF Reader
CVE-2022-40129

8.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
21 November 2022

Summary

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader. This flaw occurs in version 12.0.1.12430 and can be exploited by a specially-crafted PDF document that manipulates the Optional Content Group API, leading to the potential for arbitrary code execution. An attacker must convince the user to open this malicious file, or if the browser plugin extension is enabled, exploitation could occur simply by visiting a targeted, malicious website. This vulnerability poses a significant risk as it allows unauthorized execution of code on the affected system.

Affected Version(s)

Foxit Reader 12.0.1.12430

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.