Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-33866: CWE-416: Use After Free in Foxit Foxit Reader

0
High
VulnerabilityCVE-2023-33866cvecve-2023-33866cwe-416
Published: Wed Jul 19 2023 (07/19/2023, 13:16:37 UTC)
Source: CVE Database V5
Vendor/Project: Foxit
Product: Foxit Reader

Description

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 12.1.2.15332. By prematurely deleting objects associated with pages, a specially crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

AI-Powered Analysis

AILast updated: 11/04/2025, 20:31:44 UTC

Technical Analysis

CVE-2023-33866 is a use-after-free vulnerability classified under CWE-416, discovered in the JavaScript engine of Foxit Software's PDF Reader version 12.1.2.15332. The flaw occurs when objects associated with PDF pages are prematurely deleted, leading to the reuse of memory that has already been freed. This memory reuse can be manipulated by an attacker through a specially crafted PDF document to execute arbitrary code within the context of the vulnerable application. The vulnerability can also be triggered if a user visits a malicious website hosting a crafted PDF, provided the Foxit Reader browser plugin is enabled, expanding the attack surface beyond just local file opening. The vulnerability requires user interaction (opening a malicious PDF or visiting a malicious site) but does not require any privileges or authentication. The CVSS v3.1 score of 8.8 reflects a high severity due to the network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild, the potential for arbitrary code execution makes this vulnerability critical to address. The lack of an official patch at the time of publication necessitates interim mitigations to reduce exposure.

Potential Impact

For European organizations, the impact of this vulnerability can be severe. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to full system compromise, data theft, or disruption of services. Organizations that rely heavily on PDF documents for communication, document management, or workflow automation are particularly at risk. The vulnerability could be leveraged in targeted phishing campaigns or watering hole attacks, especially if the Foxit Reader browser plugin is enabled, increasing the attack surface. Critical sectors such as finance, healthcare, government, and manufacturing could face operational disruptions, data breaches, and reputational damage. Additionally, the ability to execute arbitrary code could facilitate lateral movement within networks, further amplifying the impact. Given the widespread use of Foxit Reader in Europe, the threat is significant, especially in environments where patch management is slow or where users frequently handle untrusted PDFs.

Mitigation Recommendations

1. Immediately disable the Foxit Reader browser plugin to prevent exploitation via malicious websites. 2. Advise users to avoid opening PDF files from untrusted or unknown sources until a patch is available. 3. Implement network-level protections such as email filtering and web content scanning to detect and block malicious PDFs. 4. Monitor for suspicious process behavior or unexpected Foxit Reader activity indicative of exploitation attempts. 5. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and prevent arbitrary code execution. 6. Once Foxit releases a security patch, prioritize deployment across all affected systems. 7. Educate users about the risks of opening unsolicited PDFs and visiting untrusted websites. 8. Consider alternative PDF readers with a better security posture temporarily if patching is delayed. 9. Restrict the use of Foxit Reader to only trusted environments or sandbox its execution to limit potential damage. 10. Maintain up-to-date backups to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-06-02T22:17:43.391Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53222a90255b94da664e

Added to database: 11/4/2025, 7:25:22 PM

Last enriched: 11/4/2025, 8:31:44 PM

Last updated: 11/6/2025, 12:57:38 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats