First published: Fri May 19 2023(Updated: )
Foxit PDF Reader (12.1.1.15289 and earlier) and Foxit PDF Editor (12.1.1.15289 and all previous 12.x versions, 11.2.5.53785 and all previous 11.x versions, and 10.1.11.37866 and earlier) on Windows allows Local Privilege Escalation when installed to a non-default directory because unprivileged users have access to an executable file of a system service. This is fixed in 12.1.2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit PDF Editor | <=10.1.11.37866 | |
Foxit PDF Editor | >=11.0.0<=11.2.5.53785 | |
Foxit PDF Editor | >=12.0.0<=12.1.1.15289 | |
Foxit PDF Reader | <=12.1.1.15289 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33240 is a vulnerability in Foxit PDF Reader and Foxit PDF Editor that allows local privilege escalation when installed to a non-default directory on Windows.
Foxit PDF Reader versions up to and including 12.1.1.15289, and Foxit PDF Editor versions up to and including 12.1.1.15289, 11.2.5.53785, and 10.1.11.37866 are affected by CVE-2023-33240.
An attacker can exploit CVE-2023-33240 by installing Foxit PDF Reader or Foxit PDF Editor to a non-default directory on Windows and then using the program to escalate privileges.
CVE-2023-33240 has a severity rating of 7.8 (high).
You can find more information about CVE-2023-33240 in the security bulletins on the Foxit website.