Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability
CVE-2023-27331

7.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
3 May 2024

Summary

A vulnerability exists within Foxit PDF Reader related to the handling of Annotation objects, leading to a use-after-free condition. This flaw allows remote attackers to execute arbitrary code on affected systems by enticing a user to open a specially crafted PDF file or visit a malicious webpage. The vulnerability arises from insufficient validation of the existence of an Annotation object before operations are performed on it. As such, it poses a significant risk, particularly as it requires user interaction for exploitation, making it crucial for users to remain cautious about the sources of their PDF documents.

Affected Version(s)

PDF Reader 12.0.2.12465

References

EPSS Score

26% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.