First published: Mon Dec 30 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the product installer. By creating a junction, an attacker can abuse the installer process to create an arbitrary file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-25408 is classified as high due to its potential for privilege escalation.
To fix ZDI-CAN-25408, update Foxit PDF Reader to the latest version that addresses this vulnerability.
Any user of Foxit PDF Reader is potentially affected by ZDI-CAN-25408, especially if running an outdated version.
ZDI-CAN-25408 can be exploited by local attackers who have already gained low-privileged access to the system.
Exploiting ZDI-CAN-25408 could allow an attacker to escalate privileges, potentially leading to unauthorized access to system resources.