CVE-2022-43310: n/a in n/a
An Uncontrolled Search Path Element in Foxit Software released Foxit Reader v11.2.118.51569 allows attackers to escalate privileges when searching for DLL libraries without specifying an absolute path.
AI Analysis
Technical Summary
CVE-2022-43310 is a high-severity vulnerability classified as an Uncontrolled Search Path Element (CWE-427) found in Foxit Reader version 11.2.118.51569. This vulnerability arises because the application searches for Dynamic Link Libraries (DLLs) without specifying an absolute path, allowing attackers to influence the DLL search order. By placing a malicious DLL in a location that is searched before the legitimate one, an attacker can cause the application to load the malicious DLL instead. This results in privilege escalation, as the malicious code executes with the permissions of the vulnerable application. The vulnerability requires local access (attack vector: local), does not require privileges to exploit (PR:N), but does require user interaction (UI:R), such as opening a crafted document or triggering the application to load a DLL. The CVSS v3.1 base score is 7.8, indicating a high impact on confidentiality, integrity, and availability. The scope is unchanged, meaning the impact is limited to the vulnerable component. Although no known exploits are reported in the wild, the vulnerability is significant due to the potential for privilege escalation on affected systems. The lack of an absolute path in DLL loading is a common security weakness that can be mitigated by specifying full paths or using secure loading functions. Foxit Reader is a widely used PDF reader, and this vulnerability could be leveraged by attackers to gain elevated privileges on systems where the vulnerable version is installed.
Potential Impact
For European organizations, the impact of CVE-2022-43310 can be substantial, especially in environments where Foxit Reader is used extensively for document handling. Successful exploitation could allow attackers to escalate privileges locally, potentially leading to unauthorized access to sensitive information, installation of persistent malware, or lateral movement within networks. This is particularly critical for sectors handling sensitive or regulated data such as finance, healthcare, government, and critical infrastructure. The requirement for local access and user interaction somewhat limits remote exploitation, but social engineering or insider threats could facilitate attacks. Additionally, compromised endpoints could serve as footholds for broader attacks, impacting confidentiality, integrity, and availability of organizational assets. Given the high CVSS score and the potential for privilege escalation, organizations must treat this vulnerability seriously to prevent exploitation that could disrupt operations or lead to data breaches.
Mitigation Recommendations
Organizations should prioritize updating Foxit Reader to a patched version once available. In the absence of an official patch, immediate mitigations include restricting local user permissions to prevent unauthorized DLL placement, implementing application whitelisting to control executable and DLL loading, and using security tools to monitor for suspicious DLL loading behavior. Administrators should educate users about the risks of opening untrusted documents and enforce strict endpoint security policies. Employing tools that enforce safe DLL search order or using Windows features like SafeDllSearchMode can reduce risk. Network segmentation and limiting local administrative privileges can further reduce the impact of potential exploitation. Regularly auditing installed software versions and applying vendor updates promptly is critical. Additionally, organizations should monitor security advisories from Foxit and related cybersecurity agencies for updates or patches addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Switzerland
CVE-2022-43310: n/a in n/a
Description
An Uncontrolled Search Path Element in Foxit Software released Foxit Reader v11.2.118.51569 allows attackers to escalate privileges when searching for DLL libraries without specifying an absolute path.
AI-Powered Analysis
Technical Analysis
CVE-2022-43310 is a high-severity vulnerability classified as an Uncontrolled Search Path Element (CWE-427) found in Foxit Reader version 11.2.118.51569. This vulnerability arises because the application searches for Dynamic Link Libraries (DLLs) without specifying an absolute path, allowing attackers to influence the DLL search order. By placing a malicious DLL in a location that is searched before the legitimate one, an attacker can cause the application to load the malicious DLL instead. This results in privilege escalation, as the malicious code executes with the permissions of the vulnerable application. The vulnerability requires local access (attack vector: local), does not require privileges to exploit (PR:N), but does require user interaction (UI:R), such as opening a crafted document or triggering the application to load a DLL. The CVSS v3.1 base score is 7.8, indicating a high impact on confidentiality, integrity, and availability. The scope is unchanged, meaning the impact is limited to the vulnerable component. Although no known exploits are reported in the wild, the vulnerability is significant due to the potential for privilege escalation on affected systems. The lack of an absolute path in DLL loading is a common security weakness that can be mitigated by specifying full paths or using secure loading functions. Foxit Reader is a widely used PDF reader, and this vulnerability could be leveraged by attackers to gain elevated privileges on systems where the vulnerable version is installed.
Potential Impact
For European organizations, the impact of CVE-2022-43310 can be substantial, especially in environments where Foxit Reader is used extensively for document handling. Successful exploitation could allow attackers to escalate privileges locally, potentially leading to unauthorized access to sensitive information, installation of persistent malware, or lateral movement within networks. This is particularly critical for sectors handling sensitive or regulated data such as finance, healthcare, government, and critical infrastructure. The requirement for local access and user interaction somewhat limits remote exploitation, but social engineering or insider threats could facilitate attacks. Additionally, compromised endpoints could serve as footholds for broader attacks, impacting confidentiality, integrity, and availability of organizational assets. Given the high CVSS score and the potential for privilege escalation, organizations must treat this vulnerability seriously to prevent exploitation that could disrupt operations or lead to data breaches.
Mitigation Recommendations
Organizations should prioritize updating Foxit Reader to a patched version once available. In the absence of an official patch, immediate mitigations include restricting local user permissions to prevent unauthorized DLL placement, implementing application whitelisting to control executable and DLL loading, and using security tools to monitor for suspicious DLL loading behavior. Administrators should educate users about the risks of opening untrusted documents and enforce strict endpoint security policies. Employing tools that enforce safe DLL search order or using Windows features like SafeDllSearchMode can reduce risk. Network segmentation and limiting local administrative privileges can further reduce the impact of potential exploitation. Regularly auditing installed software versions and applying vendor updates promptly is critical. Additionally, organizations should monitor security advisories from Foxit and related cybersecurity agencies for updates or patches addressing this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-17T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9839c4522896dcbecb51
Added to database: 5/21/2025, 9:09:13 AM
Last enriched: 7/2/2025, 1:56:45 AM
Last updated: 2/7/2026, 7:34:22 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.