Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30331: CWE-416: Use After Free in Foxit PDF Reader

0
High
VulnerabilityCVE-2024-30331cvecve-2024-30331cwe-416
Published: Wed Apr 03 2024 (04/03/2024, 16:23:02 UTC)
Source: CVE Database V5
Vendor/Project: Foxit
Product: PDF Reader

Description

Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects in AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22637.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:26:50 UTC

Technical Analysis

CVE-2024-30331 is a use-after-free vulnerability classified under CWE-416 found in Foxit PDF Reader version 2023.2.0.21408. The vulnerability specifically affects the handling of Doc objects within AcroForms, a feature used for interactive PDF forms. The root cause is the failure to validate the existence of an object before performing operations on it, which can lead to a use-after-free condition. This memory corruption flaw enables remote attackers to execute arbitrary code in the context of the Foxit PDF Reader process. Exploitation requires user interaction, such as opening a crafted malicious PDF file or visiting a malicious webpage that triggers the vulnerability. The CVSS v3.0 score is 7.8, indicating a high severity with attack vector local (requiring user action), low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability poses a significant risk due to the widespread use of Foxit PDF Reader in enterprise and personal environments. The vulnerability was reported by the Zero Day Initiative (ZDI) as ZDI-CAN-22637 and published on April 3, 2024. No patches have been linked yet, emphasizing the need for vigilance and mitigation.

Potential Impact

If exploited, this vulnerability allows attackers to execute arbitrary code remotely within the context of the Foxit PDF Reader process, potentially leading to full system compromise depending on the privileges of the user running the application. This can result in unauthorized disclosure of sensitive information, modification or deletion of data, and disruption of service. Since Foxit PDF Reader is widely used in corporate, government, and personal environments for handling PDF documents, the impact can be extensive. Attackers could leverage this flaw to deploy malware, ransomware, or establish persistent footholds. The requirement for user interaction limits mass exploitation but targeted spear-phishing campaigns or malicious document distribution could effectively exploit this vulnerability. Organizations relying on Foxit PDF Reader for document workflows, especially those handling sensitive or classified information, face elevated risks of data breaches and operational disruption.

Mitigation Recommendations

Organizations should immediately restrict the use of Foxit PDF Reader version 2023.2.0.21408 and monitor for updates or patches from Foxit Software. Until a patch is available, implement application whitelisting and sandboxing to limit the impact of potential exploitation. Educate users to avoid opening PDFs from untrusted or unknown sources and employ email filtering to block malicious attachments. Deploy endpoint detection and response (EDR) solutions capable of detecting anomalous behavior related to PDF processing. Consider using alternative PDF readers with a strong security track record for critical workflows. Network segmentation can limit lateral movement if exploitation occurs. Regularly audit and update software inventory to identify vulnerable installations. Finally, monitor threat intelligence feeds for any emerging exploits targeting this vulnerability to enable rapid response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-03-26T18:52:36.410Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6dbdb7ef31ef0b58d7f1

Added to database: 2/25/2026, 9:46:37 PM

Last enriched: 2/26/2026, 3:26:50 PM

Last updated: 4/12/2026, 7:58:00 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses