First published: Wed Feb 10 2021(Updated: )
In Foxit Reader 10.1.0.37527, a specially crafted PDF document can trigger reuse of previously free memory which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxitsoftware Foxit Reader | =10.1.0.37527 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13548 is a vulnerability in Foxit Reader 10.1.0.37527 that allows arbitrary code execution by triggering the reuse of previously free memory.
An attacker needs to trick the user into opening a specially crafted PDF document in Foxit Reader 10.1.0.37527 to trigger the vulnerability.
The severity of CVE-2020-13548 is high with a CVSS score of 8.8.
Update Foxit Reader to version 10.1.1 or later to mitigate CVE-2020-13548.
You can find more information about CVE-2020-13548 at the following link: [https://talosintelligence.com/vulnerability_reports/TALOS-2020-1166](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1166)