CVE-2024-30366: CWE-416: Use After Free in Foxit PDF Reader
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23002.
AI Analysis
Technical Summary
CVE-2024-30366 is a use-after-free vulnerability classified under CWE-416 found in Foxit PDF Reader version 2023.3.0.23028. The vulnerability specifically affects the handling of AcroForms, a feature used for interactive PDF forms. The root cause is the software's failure to verify the existence of an object before performing operations on it, leading to a use-after-free condition. This memory corruption flaw can be exploited remotely by an attacker who convinces a user to open a specially crafted malicious PDF file or visit a malicious webpage containing such a file. Upon successful exploitation, the attacker can execute arbitrary code with the privileges of the current user running Foxit PDF Reader. The vulnerability has a CVSS 3.0 base score of 7.8, indicating high severity, with attack vector local (requiring user interaction), low attack complexity, no privileges required, and impacts on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the nature of the vulnerability and the widespread use of Foxit PDF Reader make it a significant threat. The vulnerability was reported by the Zero Day Initiative (ZDI) and publicly disclosed on April 3, 2024. No patches were listed at the time of disclosure, emphasizing the need for vigilance and interim mitigations.
Potential Impact
This vulnerability allows remote attackers to execute arbitrary code on affected systems, potentially leading to full compromise of the user environment where Foxit PDF Reader is installed. The attacker could steal sensitive information, install malware, or disrupt operations by corrupting or deleting data. Since Foxit PDF Reader is widely used in enterprises and government agencies for document handling, exploitation could lead to data breaches, espionage, or ransomware deployment. The requirement for user interaction limits mass exploitation but targeted attacks against high-value individuals or organizations remain a significant risk. The flaw affects confidentiality, integrity, and availability, making it a critical concern for organizations relying on Foxit for secure document processing.
Mitigation Recommendations
Organizations should immediately restrict the use of Foxit PDF Reader version 2023.3.0.23028 and monitor for updates or patches from Foxit. Until a patch is available, users should be advised to avoid opening PDF files from untrusted or unknown sources and disable JavaScript and other interactive features in Foxit PDF Reader if possible. Employing endpoint protection solutions with behavior-based detection can help identify exploitation attempts. Network-level protections such as blocking malicious PDF attachments at email gateways and web proxies should be enforced. Additionally, organizations should implement application whitelisting and least privilege principles to limit the impact of potential exploitation. Regular user awareness training on phishing and malicious document risks is also critical. Monitoring logs for unusual Foxit process behavior can aid in early detection of exploitation attempts.
Affected Countries
United States, China, Germany, United Kingdom, France, Japan, South Korea, India, Canada, Australia
CVE-2024-30366: CWE-416: Use After Free in Foxit PDF Reader
Description
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23002.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-30366 is a use-after-free vulnerability classified under CWE-416 found in Foxit PDF Reader version 2023.3.0.23028. The vulnerability specifically affects the handling of AcroForms, a feature used for interactive PDF forms. The root cause is the software's failure to verify the existence of an object before performing operations on it, leading to a use-after-free condition. This memory corruption flaw can be exploited remotely by an attacker who convinces a user to open a specially crafted malicious PDF file or visit a malicious webpage containing such a file. Upon successful exploitation, the attacker can execute arbitrary code with the privileges of the current user running Foxit PDF Reader. The vulnerability has a CVSS 3.0 base score of 7.8, indicating high severity, with attack vector local (requiring user interaction), low attack complexity, no privileges required, and impacts on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the nature of the vulnerability and the widespread use of Foxit PDF Reader make it a significant threat. The vulnerability was reported by the Zero Day Initiative (ZDI) and publicly disclosed on April 3, 2024. No patches were listed at the time of disclosure, emphasizing the need for vigilance and interim mitigations.
Potential Impact
This vulnerability allows remote attackers to execute arbitrary code on affected systems, potentially leading to full compromise of the user environment where Foxit PDF Reader is installed. The attacker could steal sensitive information, install malware, or disrupt operations by corrupting or deleting data. Since Foxit PDF Reader is widely used in enterprises and government agencies for document handling, exploitation could lead to data breaches, espionage, or ransomware deployment. The requirement for user interaction limits mass exploitation but targeted attacks against high-value individuals or organizations remain a significant risk. The flaw affects confidentiality, integrity, and availability, making it a critical concern for organizations relying on Foxit for secure document processing.
Mitigation Recommendations
Organizations should immediately restrict the use of Foxit PDF Reader version 2023.3.0.23028 and monitor for updates or patches from Foxit. Until a patch is available, users should be advised to avoid opening PDF files from untrusted or unknown sources and disable JavaScript and other interactive features in Foxit PDF Reader if possible. Employing endpoint protection solutions with behavior-based detection can help identify exploitation attempts. Network-level protections such as blocking malicious PDF attachments at email gateways and web proxies should be enforced. Additionally, organizations should implement application whitelisting and least privilege principles to limit the impact of potential exploitation. Regular user awareness training on phishing and malicious document risks is also critical. Monitoring logs for unusual Foxit process behavior can aid in early detection of exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-03-26T18:52:36.418Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6dbfb7ef31ef0b58dad5
Added to database: 2/25/2026, 9:46:39 PM
Last enriched: 2/26/2026, 2:42:40 PM
Last updated: 4/12/2026, 3:37:35 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.