Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability
CVE-2023-27329

7.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
3 May 2024

Summary

A vulnerability in Foxit PDF Reader's handling of Annotation objects permits remote code execution by allowing attackers to exploit the lack of existence validation for these objects. This flaw enables the execution of arbitrary code within the context of the affected process, contingent upon user interaction. Users must be lured into visiting a compromised webpage or opening a malicious PDF document to trigger the exploit, highlighting the importance of vigilance when dealing with untrusted documents or URLs.

Affected Version(s)

PDF Reader 12.0.2.12465

References

EPSS Score

26% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.