CVE-2024-25938

A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Barcode widget. A specially crafted JavaScript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
talosCNA
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 83%
VendorProductVersion
foxitpdf_editor
𝑥
≤ 11.2.8.53842
foxitpdf_editor
12.0.0.12394 ≤
𝑥
≤ 12.1.4.15400
foxitpdf_editor
13.0.0.21632 ≤
𝑥
≤ 13.0.1.21693
foxitpdf_editor
2023.1.0.15510 ≤
𝑥
≤ 2023.3.0.23028
foxitpdf_editor
2024.1.0.23997
foxitpdf_reader
2024.1.0.23997
foxitpdf_editor
𝑥
≤ 11.1.6.0109
foxitpdf_editor
12.0.0.0601 ≤
𝑥
≤ 12.1.2.55366
foxitpdf_editor
13.0.0.61829 ≤
𝑥
≤ 13.0.1.61866
𝑥
= Vulnerable software versions