First published: Tue Apr 30 2024(Updated: )
A type confusion vulnerability vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Lock object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit PDF Reader |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-25575 is considered high due to its potential for arbitrary code execution.
To fix CVE-2024-25575, update Foxit Reader to the latest version provided by the vendor.
CVE-2024-25575 can facilitate attacks through specially crafted Javascript code in malicious PDF documents, leading to memory corruption.
CVE-2024-25575 affects Foxit Reader version 2024.1.0.23997.
You can identify if your system is at risk for CVE-2024-25575 by checking if you are running an affected version of Foxit Reader.