Use-After-Free Vulnerability in Foxit Software's PDF Reader
CVE-2022-40129
8.8HIGH
Summary
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader. This flaw occurs in version 12.0.1.12430 and can be exploited by a specially-crafted PDF document that manipulates the Optional Content Group API, leading to the potential for arbitrary code execution. An attacker must convince the user to open this malicious file, or if the browser plugin extension is enabled, exploitation could occur simply by visiting a targeted, malicious website. This vulnerability poses a significant risk as it allows unauthorized execution of code on the affected system.
Affected Version(s)
Foxit Reader 12.0.1.12430
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved