First published: Thu Sep 26 2024(Updated: )
In Foxit PDF Reader before 2024.3, and PDF Editor before 2024.3 and 13.x before 13.1.4, an attacker can replace an update file with a Trojan horse via side loading, because the update service lacks integrity validation for the updater. Attacker-controlled code may thus be executed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader | <2024.3 | |
Foxit PhantomPDF for Windows | <2024.3<13.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41605 is considered a critical vulnerability due to the potential for remote code execution via a Trojan horse.
To mitigate CVE-2024-41605, upgrade Foxit PDF Reader or PDF Editor to versions 2024.3 or 13.1.4 or later.
CVE-2024-41605 affects Foxit PDF Reader versions prior to 2024.3 and Foxit PDF Editor versions prior to 2024.3 and 13.1.4.
CVE-2024-41605 allows attackers to exploit the update service to execute arbitrary code by replacing update files with malicious ones.
Yes, CVE-2024-41605 can be exploited remotely by an attacker using the compromised update service to execute their code.