Foxit PDF Reader PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
CVE-2024-9248
7.8HIGH
Summary
A vulnerability in Foxit PDF Reader allows for remote code execution through improper validation of user-supplied data during PDF file parsing. Attackers can exploit this flaw by convincing users to open a specially crafted PDF file or visit a malicious link. This exploitation could lead to arbitrary code execution within the context of the application, exposing systems to potential unauthorized access and exploitation. To mitigate risks, users should ensure they are using the latest version of Foxit PDF Reader and be cautious when interacting with unknown or suspicious files.
Affected Version(s)
PDF Reader 2024.2.2.25170
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Collectors
NVD DatabaseMitre Database