Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9329: CWE-125: Out-of-bounds Read in Foxit PDF Reader

0
High
VulnerabilityCVE-2025-9329cvecve-2025-9329cwe-125
Published: Tue Sep 02 2025 (09/02/2025, 20:08:56 UTC)
Source: CVE Database V5
Vendor/Project: Foxit
Product: PDF Reader

Description

Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26772.

AI-Powered Analysis

AILast updated: 09/09/2025, 21:53:17 UTC

Technical Analysis

CVE-2025-9329 is a high-severity vulnerability affecting Foxit PDF Reader version 2024.4.0.27683. The flaw is an out-of-bounds read (CWE-125) occurring during the parsing of PRC files, which are embedded 3D model files sometimes included in PDFs. The vulnerability arises due to improper validation of user-supplied data, allowing an attacker to read beyond the allocated buffer boundaries. This memory corruption can be exploited to execute arbitrary code remotely in the context of the current user process. Exploitation requires user interaction, specifically opening a malicious PDF containing a crafted PRC file or visiting a malicious webpage that triggers the vulnerability. The CVSS v3.0 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity but requiring user interaction and local access vector (likely meaning the attack vector is local or via user action). No known exploits are reported in the wild yet, but the vulnerability was publicly disclosed on September 2, 2025. The vulnerability was tracked by ZDI as ZDI-CAN-26772. The lack of a patch link indicates that a fix may not yet be available, increasing the urgency for mitigation. This vulnerability is critical because it allows remote code execution, potentially enabling attackers to take full control of affected systems if exploited successfully.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in sectors heavily reliant on PDF documents for communication and documentation, such as finance, legal, government, and healthcare. Successful exploitation could lead to unauthorized disclosure of sensitive information, disruption of business operations, and potential lateral movement within networks. Given that Foxit PDF Reader is widely used as an alternative to Adobe Reader due to its lightweight nature and features, organizations using this software are at risk. The requirement for user interaction means phishing or social engineering campaigns could be used to deliver malicious PDFs, increasing the attack surface. Compromise could result in data breaches, ransomware deployment, or espionage activities. The vulnerability's impact on confidentiality, integrity, and availability is high, making it a critical concern for data protection and regulatory compliance under GDPR and other European data privacy laws.

Mitigation Recommendations

European organizations should immediately implement the following specific measures: 1) Identify and inventory all instances of Foxit PDF Reader version 2024.4.0.27683 in their environment. 2) Until an official patch is released, restrict or disable the opening of PRC files within PDFs by configuring Foxit Reader settings or using application control policies. 3) Employ endpoint protection solutions capable of detecting and blocking exploitation attempts targeting this vulnerability. 4) Educate users about the risks of opening unsolicited or suspicious PDF attachments, emphasizing caution with files containing embedded 3D content. 5) Use network-level controls to block access to known malicious URLs that could host exploit PDFs. 6) Monitor logs and endpoint behavior for signs of exploitation attempts, such as unusual process activity or memory access violations. 7) Consider deploying sandboxing solutions to safely open PDFs in isolated environments. 8) Stay alert for vendor updates and apply patches promptly once available. 9) Implement strict email filtering to reduce phishing emails carrying malicious PDFs. These targeted actions go beyond generic advice by focusing on the specific vector (PRC file parsing) and the software version affected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-08-21T19:50:22.974Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68b7546fad5a09ad00e86ffd

Added to database: 9/2/2025, 8:32:47 PM

Last enriched: 9/9/2025, 9:53:17 PM

Last updated: 10/16/2025, 12:59:36 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats