Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-38573: CWE-416: Use After Free in Foxit Foxit Reader

0
High
VulnerabilityCVE-2023-38573cvecve-2023-38573cwe-416
Published: Mon Nov 27 2023 (11/27/2023, 15:25:08 UTC)
Source: CVE Database V5
Vendor/Project: Foxit
Product: Foxit Reader

Description

A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles a signature field. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

AI-Powered Analysis

AILast updated: 11/04/2025, 23:52:05 UTC

Technical Analysis

CVE-2023-38573 is a use-after-free vulnerability (CWE-416) identified in Foxit Reader version 12.1.3.15356. The flaw exists in the way the application handles the signature field within PDF documents. Specifically, a malicious PDF containing specially crafted JavaScript can cause the program to reuse a previously freed memory object, leading to memory corruption. This corruption can be exploited to execute arbitrary code on the victim's machine. The attack vector requires user interaction: the victim must open the malicious PDF file or visit a malicious website hosting such a PDF if the Foxit Reader browser plugin is enabled. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits have been reported in the wild, the potential for arbitrary code execution makes this a critical risk. The vulnerability affects a widely used PDF reader, which is common in many enterprise environments, increasing the attack surface. The lack of an official patch at the time of reporting necessitates immediate mitigation through configuration changes and user awareness.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Foxit Reader in business, government, and educational institutions. Successful exploitation could lead to full system compromise, data theft, ransomware deployment, or disruption of critical services. The ability to execute arbitrary code remotely without privileges and with only user interaction means phishing campaigns or malicious websites can be effective attack vectors. Confidentiality of sensitive documents and intellectual property could be compromised, and integrity of systems undermined. Availability could also be affected if attackers deploy destructive payloads. Sectors such as finance, healthcare, legal, and public administration, which heavily rely on PDF documents and digital signatures, are particularly vulnerable. The risk is amplified if the Foxit Reader browser plugin is enabled, expanding the attack surface to web browsing activities.

Mitigation Recommendations

1. Immediately disable JavaScript execution within Foxit Reader to prevent malicious scripts embedded in PDFs from running. 2. Disable or uninstall the Foxit Reader browser plugin to eliminate the attack vector via malicious websites. 3. Educate users to avoid opening PDFs from untrusted or unknown sources and to be cautious with email attachments and links. 4. Monitor network traffic and endpoint behavior for signs of exploitation attempts, such as unusual process activity or memory corruption indicators. 5. Apply vendor patches as soon as they become available; maintain close contact with Foxit for updates. 6. Employ application whitelisting and endpoint detection and response (EDR) tools to detect and block suspicious activities related to Foxit Reader. 7. Implement strict email filtering and sandboxing to reduce the likelihood of malicious PDFs reaching end users. 8. Regularly audit and update PDF reader software across the organization to minimize exposure to known vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2023-09-08T16:47:44.441Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6841d069182aa0cae2e88640

Added to database: 6/5/2025, 5:14:17 PM

Last enriched: 11/4/2025, 11:52:05 PM

Last updated: 12/1/2025, 11:54:42 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats