#VU1032 Privilege escalation in Foxit PDF Reader for Windows and Foxit PDF Editor (formerly Foxit PhantomPDF)


| Updated: 2016-10-21

Vulnerability identifier: #VU1032

Vulnerability risk: High

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: N/A

CWE-ID: CWE-284

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Foxit PDF Reader for Windows
Client/Desktop applications / Office applications
Foxit PDF Editor (formerly Foxit PhantomPDF)
Client/Desktop applications / Office applications

Vendor: Foxit Software Inc.

Description
The vulnerability allows a local user to obtain elevated privileges on the target system.
The vulnerability exists due to weak file permissions that lets attacker to elevate his privileges and access the system.
Successful exploitation of this vulnerability may result in arbitrary code execution on the vulnerable system.

Mitigation
Update Foxit Reader to version 8.1.
Update Foxit PhantomPDF to version 8.1.

Vulnerable software versions

Foxit PDF Reader for Windows: 8.0.2.805

Foxit PDF Editor (formerly Foxit PhantomPDF): 8.0.2.805


External links
https://www.foxitsoftware.com/support/security-bulletins.php


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability