Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12751: CWE-125: Out-of-bounds Read in Foxit PDF Reader

0
High
VulnerabilityCVE-2024-12751cvecve-2024-12751cwe-125
Published: Mon Dec 30 2024 (12/30/2024, 20:13:40 UTC)
Source: CVE Database V5
Vendor/Project: Foxit
Product: PDF Reader

Description

CVE-2024-12751 is a high-severity out-of-bounds read vulnerability in Foxit PDF Reader's AcroForm handling that allows remote attackers to execute arbitrary code. Exploitation requires user interaction, such as opening a malicious PDF or visiting a malicious page. The flaw arises from improper validation of user-supplied data, leading to reading beyond allocated buffers and enabling code execution in the context of the current process. The affected version is Foxit PDF Reader 2024. 2. 3. 25184. No known exploits are currently reported in the wild. The vulnerability impacts confidentiality, integrity, and availability, with a CVSS score of 7. 8.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:57:18 UTC

Technical Analysis

CVE-2024-12751 is a remote code execution vulnerability identified in Foxit PDF Reader version 2024.2.3.25184, specifically within the AcroForm component responsible for handling interactive PDF forms. The vulnerability is classified as CWE-125, an out-of-bounds read, which occurs due to insufficient validation of user-supplied data when processing AcroForms. This improper validation allows an attacker to read memory beyond the intended buffer limits, potentially leading to memory corruption. By crafting a malicious PDF file or embedding malicious content in a web page, an attacker can trigger this flaw when a user opens the file or visits the page, resulting in arbitrary code execution within the context of the Foxit PDF Reader process. The attack vector requires user interaction but does not require prior authentication or elevated privileges. The CVSS 3.0 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability. While no public exploits have been reported yet, the vulnerability poses a significant risk due to the widespread use of Foxit PDF Reader in enterprise and personal environments. The flaw was reported by the Zero Day Initiative (ZDI) and is tracked as ZDI-CAN-25344. No official patch links are currently available, indicating that users must monitor vendor advisories closely. The vulnerability's exploitation could lead to full system compromise if the PDF reader runs with user-level privileges, potentially allowing lateral movement or data exfiltration.

Potential Impact

The impact of CVE-2024-12751 is substantial for organizations globally that rely on Foxit PDF Reader, especially version 2024.2.3.25184. Successful exploitation can lead to arbitrary code execution, compromising the confidentiality, integrity, and availability of affected systems. Attackers could execute malicious payloads, install malware, or gain persistent access, potentially leading to data breaches or disruption of business operations. Since PDF readers are commonly used for document handling across industries, this vulnerability could be leveraged in targeted phishing campaigns or drive-by downloads. The requirement for user interaction limits automated exploitation but does not eliminate risk, as social engineering can induce users to open malicious PDFs. Organizations with high document exchange volumes, such as financial institutions, government agencies, and healthcare providers, face elevated risk. Additionally, environments where Foxit PDF Reader is integrated into automated workflows or document processing systems may experience broader impact. The lack of a current patch increases exposure, emphasizing the need for interim mitigations.

Mitigation Recommendations

To mitigate CVE-2024-12751, organizations should implement the following specific measures: 1) Immediately identify and inventory all instances of Foxit PDF Reader version 2024.2.3.25184 within the environment. 2) Apply vendor patches promptly once released; monitor Foxit's official security advisories for updates. 3) Until patches are available, restrict the opening of untrusted or unsolicited PDF files, especially those containing AcroForms, through email filtering and endpoint controls. 4) Employ application whitelisting and sandboxing techniques to isolate PDF reader processes and limit the impact of potential exploitation. 5) Configure security solutions to detect and block suspicious PDF behaviors, including anomalous form data processing. 6) Educate users on the risks of opening PDFs from unknown sources and implement phishing awareness training. 7) Consider deploying network-level protections such as web filtering to block access to malicious sites hosting exploit PDFs. 8) Review and harden PDF reader configurations to disable unnecessary features related to form processing if feasible. 9) Monitor endpoint and network logs for indicators of compromise related to PDF exploitation attempts. These targeted actions go beyond generic advice and focus on reducing attack surface and exposure until a patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-12-18T16:29:34.214Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6e48b7ef31ef0b59c43c

Added to database: 2/25/2026, 9:48:56 PM

Last enriched: 2/26/2026, 2:57:18 AM

Last updated: 2/26/2026, 8:07:38 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats