Code Execution Vulnerability in Foxit Reader by Foxit Software
CVE-2023-39542

8.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
27 November 2023

Summary

A code execution vulnerability in the Javascript saveAs API of Foxit Reader allows attackers to execute arbitrary files through specially crafted malformed files. This exploitation can occur if a user opens a malicious file, or if they visit a malicious website with the browser plugin enabled. Users should exercise caution and ensure their software is up-to-date to mitigate the risks associated with this vulnerability.

Affected Version(s)

Foxit Reader 12.1.3.15356

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Discovered by Kamlapati Choubey of Cisco Talos.
.