CVE-2024-12753

Foxit PDF Reader Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the product installer. By creating a junction, an attacker can abuse the installer process to create an arbitrary file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25408.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

08 Aug 2025, 17:48

Type Values Removed Values Added
CPE cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3
References () https://www.foxit.com/support/security-bulletins.html - () https://www.foxit.com/support/security-bulletins.html - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-24-1739/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-1739/ - Third Party Advisory
First Time Foxit
Foxit pdf Editor
Microsoft windows
Microsoft
Foxit pdf Reader

30 Dec 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-30 21:15

Updated : 2025-08-08 17:48


NVD link : CVE-2024-12753

Mitre link : CVE-2024-12753


JSON object : View

Products Affected

foxit

  • pdf_reader
  • pdf_editor

microsoft

  • windows
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')