
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability (CVE-2023-33876) was discovered in Foxit Reader version 12.1.2.15332. The vulnerability was identified in July 2023 and affects the way the software handles destroying annotations. This security flaw was discovered by Kamlapati Choubey and Aleksandar Nikolic of Cisco Talos (Talos Report).
The vulnerability exists in the way Foxit Reader handles certain events of form elements, specifically during the destruction of annotations. When specially crafted Javascript code inside a malicious PDF document triggers the reuse of a previously freed object, it can lead to memory corruption. The issue occurs when a recently freed object is accessed without proper validation, resulting in a use-after-free condition. The vulnerability has been assigned a CVSS v3.1 score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (Talos Report).
If successfully exploited, this vulnerability can lead to arbitrary code execution on the target system. The impact is particularly severe as it can result in complete compromise of the affected system, allowing attackers to execute malicious code with the same privileges as the application (Talos Report).
Foxit has released patches to address this vulnerability. Users are advised to update to version 12.1.3 or later. The patches are available through the official Foxit download channels (Foxit Reader, Foxit PhantomPDF).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."