Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30329: CWE-416: Use After Free in Foxit PDF Reader

0
Low
VulnerabilityCVE-2024-30329cvecve-2024-30329cwe-416
Published: Wed Apr 03 2024 (04/03/2024, 16:22:37 UTC)
Source: CVE Database V5
Vendor/Project: Foxit
Product: PDF Reader

Description

Foxit PDF Reader Annotation Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22634.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:58:44 UTC

Technical Analysis

CVE-2024-30329 is a use-after-free vulnerability classified under CWE-416 that affects Foxit PDF Reader version 2023.2.0.21408. The vulnerability specifically targets the handling of Annotation objects within the PDF reader. The root cause is the software's failure to verify whether an Annotation object still exists before performing operations on it, leading to a use-after-free condition. This memory management flaw can be exploited by remote attackers who trick users into opening malicious PDF files or visiting malicious web pages containing crafted PDF content. Exploitation requires user interaction but no prior authentication or elevated privileges. The immediate impact is information disclosure due to reading freed memory, which may contain sensitive data. Furthermore, this vulnerability can be combined with other vulnerabilities to escalate the attack to arbitrary code execution within the context of the Foxit PDF Reader process. The CVSS v3.0 base score is 3.3, reflecting low severity primarily due to the need for user interaction and limited impact scope. No public patches or known exploits have been reported at the time of publication. The vulnerability was identified and assigned by the Zero Day Initiative (ZDI) as ZDI-CAN-22634. Given the widespread use of Foxit PDF Reader in enterprise and consumer environments, this vulnerability represents a potential vector for targeted attacks, especially in scenarios where users frequently handle PDFs from untrusted sources.

Potential Impact

The primary impact of CVE-2024-30329 is the disclosure of sensitive information from the memory of the Foxit PDF Reader process, which could include confidential document data or other in-memory information. While the vulnerability itself does not allow direct code execution, its exploitation can be a stepping stone when chained with other vulnerabilities, potentially leading to full compromise of the affected system. Organizations relying on Foxit PDF Reader for document workflows, especially those processing untrusted PDFs, face risks of data leakage and subsequent exploitation. The requirement for user interaction limits mass exploitation but does not eliminate targeted phishing or social engineering attacks. The vulnerability could undermine confidentiality in regulated industries such as finance, healthcare, and government, where PDF documents often contain sensitive information. Additionally, attackers may use this flaw to gain footholds in networks by combining it with other exploits, increasing the overall risk posture. The absence of known exploits reduces immediate threat but does not preclude future weaponization.

Mitigation Recommendations

1. Monitor Foxit Software advisories and apply official patches or updates promptly once released for version 2023.2.0.21408 or affected versions. 2. Implement strict controls on PDF file sources by blocking or quarantining PDFs from untrusted or unknown origins, especially in email gateways and web proxies. 3. Educate users about the risks of opening PDFs from unverified sources and encourage cautious behavior to reduce the likelihood of user interaction exploitation. 4. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous behavior related to PDF reader processes and memory exploitation attempts. 5. Use application whitelisting and sandboxing techniques to limit the execution context of Foxit PDF Reader, reducing the impact of potential exploitation. 6. Consider deploying network-level protections such as intrusion prevention systems (IPS) with signatures targeting PDF-related exploits. 7. Regularly audit and update software inventory to identify and remediate vulnerable versions of Foxit PDF Reader across the organization. 8. If patching is delayed, consider temporarily restricting or disabling Foxit PDF Reader usage in high-risk environments or replacing it with alternative PDF readers with better security track records.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-03-26T18:52:36.410Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6dbdb7ef31ef0b58d7ed

Added to database: 2/25/2026, 9:46:37 PM

Last enriched: 2/26/2026, 5:58:44 PM

Last updated: 4/12/2026, 5:31:31 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses