Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7722: CWE-416: Use After Free in Foxit PDF Reader

0
Low
VulnerabilityCVE-2024-7722cvecve-2024-7722cwe-416
Published: Wed Aug 21 2024 (08/21/2024, 16:04:21 UTC)
Source: CVE Database V5
Vendor/Project: Foxit
Product: PDF Reader

Description

CVE-2024-7722 is a use-after-free vulnerability in Foxit PDF Reader version 2024. 1. 0. 23997 affecting the handling of Doc objects. It allows remote attackers to disclose sensitive information if a user opens a malicious PDF or visits a malicious page, requiring user interaction. The flaw arises from improper validation of object existence before operations, potentially enabling information disclosure and, when combined with other vulnerabilities, arbitrary code execution. The CVSS score is 3. 3, indicating low severity, with no known exploits in the wild. This vulnerability impacts confidentiality but not integrity or availability. Mitigation involves updating Foxit PDF Reader once patches are available and exercising caution with untrusted PDFs.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:46:47 UTC

Technical Analysis

CVE-2024-7722 is a use-after-free vulnerability classified under CWE-416 found in Foxit PDF Reader version 2024.1.0.23997. The vulnerability specifically affects the handling of Doc objects within the application. The root cause is the failure to validate the existence of an object before performing operations on it, which leads to a use-after-free condition. Exploiting this flaw requires user interaction, such as opening a malicious PDF file or visiting a malicious web page that triggers the vulnerability. Successful exploitation allows remote attackers to disclose sensitive information from the affected system. Furthermore, this vulnerability can be chained with other vulnerabilities to achieve arbitrary code execution within the context of the Foxit PDF Reader process. The CVSS v3.0 base score is 3.3, reflecting low severity due to the requirement for user interaction, local attack vector, and limited impact on confidentiality only. There are currently no known exploits in the wild, and no patches have been linked yet. The vulnerability was assigned and published by the Zero Day Initiative (ZDI) under the identifier ZDI-CAN-23702. The issue highlights the importance of proper memory management and validation in PDF rendering engines, which are common targets for attackers due to their widespread use and complex parsing logic.

Potential Impact

The primary impact of CVE-2024-7722 is information disclosure, which can lead to leakage of sensitive data from the victim's environment. While the vulnerability itself does not directly compromise system integrity or availability, the potential for chaining with other vulnerabilities to achieve arbitrary code execution raises the risk profile. Organizations relying on Foxit PDF Reader, especially in environments where sensitive documents are handled, may face confidentiality breaches if users are tricked into opening malicious PDFs. The requirement for user interaction limits the attack surface but does not eliminate risk, particularly in sectors with high exposure to targeted phishing or spear-phishing campaigns. The low CVSS score suggests limited immediate impact, but the possibility of escalation through combined exploits means organizations should not ignore this vulnerability. Failure to address it could lead to data leaks or footholds for further compromise in complex attack scenarios.

Mitigation Recommendations

Organizations should monitor Foxit's official channels for patches addressing CVE-2024-7722 and apply updates promptly once available. Until patches are released, users should be advised to avoid opening PDF files from untrusted or unknown sources and to exercise caution when browsing websites that may host malicious content. Employing endpoint protection solutions with behavioral detection can help identify exploitation attempts. Network defenses such as email filtering, attachment sandboxing, and URL reputation services can reduce exposure to malicious PDFs and links. Administrators should consider restricting or monitoring the use of Foxit PDF Reader in high-risk environments and evaluate alternative PDF readers with a strong security track record. Additionally, implementing application whitelisting and sandboxing can limit the impact of potential exploitation. Regular user training on phishing awareness will reduce the likelihood of successful exploitation via social engineering.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-08-12T21:29:45.371Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6c1db7ef31ef0b5601c2

Added to database: 2/25/2026, 9:39:41 PM

Last enriched: 2/26/2026, 3:46:47 AM

Last updated: 2/26/2026, 8:09:11 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats