Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12752: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in Foxit PDF Reader

0
High
VulnerabilityCVE-2024-12752cvecve-2024-12752cwe-119
Published: Mon Dec 30 2024 (12/30/2024, 20:13:55 UTC)
Source: CVE Database V5
Vendor/Project: Foxit
Product: PDF Reader

Description

CVE-2024-12752 is a high-severity remote code execution vulnerability in Foxit PDF Reader version 2024. 2. 3. 25184. It arises from improper validation of user-supplied data in the handling of AcroForms, leading to memory corruption. Exploitation requires user interaction, such as opening a malicious PDF file or visiting a malicious page. Successful exploitation allows attackers to execute arbitrary code with the privileges of the current user. The vulnerability is classified under CWE-119, indicating a buffer-related memory corruption issue. No known exploits are currently reported in the wild. Due to the widespread use of Foxit PDF Reader, this vulnerability poses a significant risk to organizations that rely on this software for PDF handling.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:57:03 UTC

Technical Analysis

CVE-2024-12752 is a memory corruption vulnerability in Foxit PDF Reader version 2024.2.3.25184, specifically within the processing of AcroForms, which are interactive form elements embedded in PDF documents. The root cause is an improper restriction of operations within the bounds of a memory buffer (CWE-119), where user-supplied data is not properly validated before being processed. This flaw allows an attacker to craft malicious PDF files or web pages containing malicious PDFs that, when opened or accessed by a user, trigger memory corruption. This corruption can be exploited to execute arbitrary code in the context of the Foxit PDF Reader process, potentially leading to full compromise of the affected system under the privileges of the user running the application. The vulnerability requires user interaction, such as opening a malicious file or visiting a malicious page, but does not require prior authentication or elevated privileges. The CVSS v3.0 score is 7.8 (high), reflecting the significant confidentiality, integrity, and availability impacts possible, combined with the need for user interaction and local attack vector. No public exploits have been reported yet, but the vulnerability was tracked by ZDI as ZDI-CAN-25345, indicating active monitoring by security researchers. The lack of a patch at the time of reporting means organizations must rely on interim mitigations to reduce risk.

Potential Impact

The impact of CVE-2024-12752 is substantial for organizations using Foxit PDF Reader, especially in environments where PDF documents are frequently exchanged or downloaded from external sources. Successful exploitation can lead to arbitrary code execution, allowing attackers to install malware, steal sensitive information, or move laterally within a network. Because the vulnerability affects confidentiality, integrity, and availability, it could facilitate data breaches, ransomware deployment, or disruption of business operations. The requirement for user interaction limits automated exploitation but does not eliminate risk, as social engineering or phishing campaigns can be used to trick users into opening malicious PDFs. Organizations with high volumes of PDF processing, such as legal, financial, healthcare, and government sectors, face elevated risk. The absence of known exploits in the wild currently reduces immediate threat but vigilance is necessary given the high severity and potential for rapid weaponization.

Mitigation Recommendations

1. Apply official patches from Foxit as soon as they become available to remediate the vulnerability directly. 2. Until patches are released, restrict usage of Foxit PDF Reader to trusted documents only and educate users to avoid opening PDFs from unknown or untrusted sources. 3. Employ application whitelisting and sandboxing techniques to limit the impact of potential code execution within the PDF reader process. 4. Use endpoint detection and response (EDR) tools to monitor for suspicious behavior related to PDF processing. 5. Configure network security controls to block or flag PDF files from untrusted external sources, including email gateways and web proxies. 6. Consider deploying alternative PDF readers with a lower attack surface or better security track record in sensitive environments. 7. Regularly update and audit security awareness training to reduce the likelihood of successful social engineering attacks involving malicious PDFs. 8. Monitor threat intelligence feeds for any emerging exploit code or attack campaigns targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-12-18T16:29:46.764Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6e48b7ef31ef0b59c440

Added to database: 2/25/2026, 9:48:56 PM

Last enriched: 2/26/2026, 2:57:03 AM

Last updated: 2/26/2026, 8:01:32 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats