Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30358: CWE-416: Use After Free in Foxit PDF Reader

0
High
VulnerabilityCVE-2024-30358cvecve-2024-30358cwe-416
Published: Tue Apr 02 2024 (04/02/2024, 20:17:11 UTC)
Source: CVE Database V5
Vendor/Project: Foxit
Product: PDF Reader

Description

Foxit PDF Reader AcroForm User-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22821.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 14:57:38 UTC

Technical Analysis

CVE-2024-30358 is a use-after-free vulnerability classified under CWE-416 found in Foxit PDF Reader version 2023.3.0.23028. The vulnerability specifically affects the handling of AcroForms, interactive form elements within PDF documents. The root cause is the failure to validate whether an object exists before performing operations on it, which leads to a use-after-free condition. When a maliciously crafted PDF containing manipulated AcroForm elements is opened, or a malicious page is visited that triggers the PDF reader, the vulnerability can be exploited to execute arbitrary code remotely. The exploit requires user interaction, such as opening a malicious file or visiting a malicious webpage. Successful exploitation allows attackers to run code with the privileges of the Foxit PDF Reader process, potentially enabling full system compromise depending on the user's permissions. The CVSS v3.0 score is 7.8 (high), reflecting the vulnerability's significant impact on confidentiality, integrity, and availability with low attack complexity but requiring user interaction and local access vector. No known public exploits or active exploitation in the wild have been reported as of the publication date. The vulnerability was reported by the Zero Day Initiative (ZDI) and publicly disclosed on April 2, 2024. No official patches were linked at the time of disclosure, indicating users should monitor for updates from Foxit. This vulnerability is critical for environments where Foxit PDF Reader is widely deployed, especially in sectors relying heavily on PDF documents for communication and documentation.

Potential Impact

The impact of CVE-2024-30358 is substantial for organizations worldwide using Foxit PDF Reader 2023.3.0.23028. Exploitation can lead to arbitrary code execution, allowing attackers to install malware, steal sensitive information, or disrupt operations. Since the code runs with the privileges of the PDF reader process, if the user has administrative rights, the attacker could gain full system control. This threatens confidentiality by exposing sensitive documents and credentials, integrity by enabling unauthorized modifications, and availability by potentially causing system crashes or ransomware deployment. The requirement for user interaction limits mass exploitation but targeted phishing or watering hole attacks remain viable. Organizations in sectors such as finance, government, healthcare, and critical infrastructure are particularly vulnerable due to their reliance on PDFs and the potential value of compromised data. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score indicates urgency in addressing the vulnerability to prevent future attacks.

Mitigation Recommendations

1. Monitor Foxit's official channels for patches addressing CVE-2024-30358 and apply updates immediately upon release. 2. Until patches are available, restrict Foxit PDF Reader usage to trusted documents only, employing strict email and web filtering to block suspicious PDFs. 3. Employ application whitelisting to prevent execution of unauthorized code spawned by the PDF reader. 4. Use endpoint detection and response (EDR) solutions to monitor for anomalous behavior related to PDF processing. 5. Educate users about the risks of opening PDFs from unknown or untrusted sources and implement phishing awareness training. 6. Consider sandboxing or running Foxit PDF Reader in a restricted environment to limit the impact of potential exploitation. 7. Disable or limit AcroForm functionality if not required, reducing the attack surface. 8. Regularly audit and update security policies related to document handling and software usage. These steps go beyond generic advice by focusing on immediate containment, user education, and environment hardening specific to this vulnerability's characteristics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-03-26T18:52:36.415Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6dbfb7ef31ef0b58dab5

Added to database: 2/25/2026, 9:46:39 PM

Last enriched: 2/26/2026, 2:57:38 PM

Last updated: 4/11/2026, 9:24:20 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses