Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12753: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Foxit PDF Reader

0
Medium
VulnerabilityCVE-2024-12753cvecve-2024-12753cwe-59
Published: Mon Dec 30 2024 (12/30/2024, 20:14:13 UTC)
Source: CVE Database V5
Vendor/Project: Foxit
Product: PDF Reader

Description

CVE-2024-12753 is a local privilege escalation vulnerability in Foxit PDF Reader version 2024. 2. 3. 25184. It arises from improper link resolution (CWE-59) in the product installer, allowing an attacker with low-privileged code execution to create a junction that tricks the installer into creating arbitrary files. Exploiting this flaw enables escalation to SYSTEM privileges and arbitrary code execution. The vulnerability requires local access, low-privileged code execution, and user interaction, with a CVSS score of 6. 7 (medium severity). No known exploits are currently reported in the wild. Organizations using the affected Foxit PDF Reader version should prioritize patching or applying mitigations to prevent privilege escalation risks.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:59:32 UTC

Technical Analysis

CVE-2024-12753 is a local privilege escalation vulnerability identified in Foxit PDF Reader version 2024.2.3.25184, linked to improper link resolution before file access (CWE-59) within the product installer. The vulnerability allows an attacker who already has the ability to execute code with low privileges on the target system to escalate their privileges to SYSTEM level. The core issue stems from the installer process improperly handling symbolic links or junctions. By creating a malicious junction, an attacker can manipulate the installer to write or create arbitrary files in locations that normally require elevated privileges. This improper link following enables the attacker to execute arbitrary code with SYSTEM privileges, effectively compromising the entire system's security. Exploitation requires local access, the ability to run low-privileged code, and some user interaction, such as triggering the installer. The vulnerability was assigned CVE-2024-12753 and was published on December 30, 2024, with a CVSS v3.0 base score of 6.7, reflecting medium severity. No public exploits or widespread attacks have been reported yet, but the flaw poses a significant risk if combined with other attack vectors that grant initial code execution.

Potential Impact

The primary impact of CVE-2024-12753 is the potential for local attackers to escalate privileges from a low-privileged user context to SYSTEM level on affected Windows systems running the vulnerable Foxit PDF Reader installer. This escalation can lead to full system compromise, allowing attackers to install persistent malware, disable security controls, access sensitive data, or move laterally within a network. Organizations relying on Foxit PDF Reader in environments where users have local access are at risk, especially in enterprise or shared workstation settings. The vulnerability could be leveraged in multi-stage attacks where initial foothold is gained through phishing or other means, then privilege escalation is used to deepen control. Although no known exploits are currently active in the wild, the medium severity rating and SYSTEM-level impact warrant prompt attention to prevent potential exploitation. The scope is limited to systems with the specific vulnerable version installed and requires local code execution, reducing remote attack risk but still significant in insider threat or compromised endpoint scenarios.

Mitigation Recommendations

To mitigate CVE-2024-12753, organizations should first verify if they are running Foxit PDF Reader version 2024.2.3.25184 or other affected versions and apply any available patches or updates from Foxit as soon as they are released. In the absence of an official patch, restrict local user permissions to prevent unauthorized code execution and limit the ability to create junctions or symbolic links in sensitive directories. Employ application whitelisting and endpoint protection solutions to detect and block suspicious installer behaviors or unauthorized file system manipulations. Monitor system logs for unusual installer activity or attempts to create junctions. Educate users to avoid running untrusted installers or executables and enforce the principle of least privilege to reduce the risk of initial low-privileged code execution. Additionally, consider isolating systems running Foxit PDF Reader in high-risk environments and use endpoint detection and response (EDR) tools to identify potential exploitation attempts. Regularly audit installed software versions and maintain an asset inventory to quickly identify vulnerable installations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-12-18T16:29:58.802Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6e48b7ef31ef0b59c444

Added to database: 2/25/2026, 9:48:56 PM

Last enriched: 2/26/2026, 2:59:32 AM

Last updated: 2/26/2026, 5:30:44 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats