Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability
CVE-2023-27331
7.8HIGH
Summary
A vulnerability exists within Foxit PDF Reader related to the handling of Annotation objects, leading to a use-after-free condition. This flaw allows remote attackers to execute arbitrary code on affected systems by enticing a user to open a specially crafted PDF file or visit a malicious webpage. The vulnerability arises from insufficient validation of the existence of an Annotation object before operations are performed on it. As such, it poses a significant risk, particularly as it requires user interaction for exploitation, making it crucial for users to remain cautious about the sources of their PDF documents.
Affected Version(s)
PDF Reader 12.0.2.12465
References
EPSS Score
26% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved