CVE-2025-9329: CWE-125: Out-of-bounds Read in Foxit PDF Reader
Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26772.
AI Analysis
Technical Summary
CVE-2025-9329 is a high-severity vulnerability affecting Foxit PDF Reader version 2024.4.0.27683. The flaw is an out-of-bounds read (CWE-125) occurring during the parsing of PRC files, which are embedded 3D model files sometimes included in PDFs. The vulnerability arises due to improper validation of user-supplied data, allowing an attacker to read beyond the allocated buffer boundaries. This memory corruption can be exploited to execute arbitrary code remotely in the context of the current user process. Exploitation requires user interaction, specifically opening a malicious PDF containing a crafted PRC file or visiting a malicious webpage that triggers the vulnerability. The CVSS v3.0 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity but requiring user interaction and local access vector (likely meaning the attack vector is local or via user action). No known exploits are reported in the wild yet, but the vulnerability was publicly disclosed on September 2, 2025. The vulnerability was tracked by ZDI as ZDI-CAN-26772. The lack of a patch link indicates that a fix may not yet be available, increasing the urgency for mitigation. This vulnerability is critical because it allows remote code execution, potentially enabling attackers to take full control of affected systems if exploited successfully.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in sectors heavily reliant on PDF documents for communication and documentation, such as finance, legal, government, and healthcare. Successful exploitation could lead to unauthorized disclosure of sensitive information, disruption of business operations, and potential lateral movement within networks. Given that Foxit PDF Reader is widely used as an alternative to Adobe Reader due to its lightweight nature and features, organizations using this software are at risk. The requirement for user interaction means phishing or social engineering campaigns could be used to deliver malicious PDFs, increasing the attack surface. Compromise could result in data breaches, ransomware deployment, or espionage activities. The vulnerability's impact on confidentiality, integrity, and availability is high, making it a critical concern for data protection and regulatory compliance under GDPR and other European data privacy laws.
Mitigation Recommendations
European organizations should immediately implement the following specific measures: 1) Identify and inventory all instances of Foxit PDF Reader version 2024.4.0.27683 in their environment. 2) Until an official patch is released, restrict or disable the opening of PRC files within PDFs by configuring Foxit Reader settings or using application control policies. 3) Employ endpoint protection solutions capable of detecting and blocking exploitation attempts targeting this vulnerability. 4) Educate users about the risks of opening unsolicited or suspicious PDF attachments, emphasizing caution with files containing embedded 3D content. 5) Use network-level controls to block access to known malicious URLs that could host exploit PDFs. 6) Monitor logs and endpoint behavior for signs of exploitation attempts, such as unusual process activity or memory access violations. 7) Consider deploying sandboxing solutions to safely open PDFs in isolated environments. 8) Stay alert for vendor updates and apply patches promptly once available. 9) Implement strict email filtering to reduce phishing emails carrying malicious PDFs. These targeted actions go beyond generic advice by focusing on the specific vector (PRC file parsing) and the software version affected.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Switzerland
CVE-2025-9329: CWE-125: Out-of-bounds Read in Foxit PDF Reader
Description
Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26772.
AI-Powered Analysis
Technical Analysis
CVE-2025-9329 is a high-severity vulnerability affecting Foxit PDF Reader version 2024.4.0.27683. The flaw is an out-of-bounds read (CWE-125) occurring during the parsing of PRC files, which are embedded 3D model files sometimes included in PDFs. The vulnerability arises due to improper validation of user-supplied data, allowing an attacker to read beyond the allocated buffer boundaries. This memory corruption can be exploited to execute arbitrary code remotely in the context of the current user process. Exploitation requires user interaction, specifically opening a malicious PDF containing a crafted PRC file or visiting a malicious webpage that triggers the vulnerability. The CVSS v3.0 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity but requiring user interaction and local access vector (likely meaning the attack vector is local or via user action). No known exploits are reported in the wild yet, but the vulnerability was publicly disclosed on September 2, 2025. The vulnerability was tracked by ZDI as ZDI-CAN-26772. The lack of a patch link indicates that a fix may not yet be available, increasing the urgency for mitigation. This vulnerability is critical because it allows remote code execution, potentially enabling attackers to take full control of affected systems if exploited successfully.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in sectors heavily reliant on PDF documents for communication and documentation, such as finance, legal, government, and healthcare. Successful exploitation could lead to unauthorized disclosure of sensitive information, disruption of business operations, and potential lateral movement within networks. Given that Foxit PDF Reader is widely used as an alternative to Adobe Reader due to its lightweight nature and features, organizations using this software are at risk. The requirement for user interaction means phishing or social engineering campaigns could be used to deliver malicious PDFs, increasing the attack surface. Compromise could result in data breaches, ransomware deployment, or espionage activities. The vulnerability's impact on confidentiality, integrity, and availability is high, making it a critical concern for data protection and regulatory compliance under GDPR and other European data privacy laws.
Mitigation Recommendations
European organizations should immediately implement the following specific measures: 1) Identify and inventory all instances of Foxit PDF Reader version 2024.4.0.27683 in their environment. 2) Until an official patch is released, restrict or disable the opening of PRC files within PDFs by configuring Foxit Reader settings or using application control policies. 3) Employ endpoint protection solutions capable of detecting and blocking exploitation attempts targeting this vulnerability. 4) Educate users about the risks of opening unsolicited or suspicious PDF attachments, emphasizing caution with files containing embedded 3D content. 5) Use network-level controls to block access to known malicious URLs that could host exploit PDFs. 6) Monitor logs and endpoint behavior for signs of exploitation attempts, such as unusual process activity or memory access violations. 7) Consider deploying sandboxing solutions to safely open PDFs in isolated environments. 8) Stay alert for vendor updates and apply patches promptly once available. 9) Implement strict email filtering to reduce phishing emails carrying malicious PDFs. These targeted actions go beyond generic advice by focusing on the specific vector (PRC file parsing) and the software version affected.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2025-08-21T19:50:22.974Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68b7546fad5a09ad00e86ffd
Added to database: 9/2/2025, 8:32:47 PM
Last enriched: 9/9/2025, 9:53:17 PM
Last updated: 10/16/2025, 12:59:36 PM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9804: Vulnerability in WSO2 WSO2 Identity Server as Key Manager
CriticalCVE-2025-9152: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.