CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-30346

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00193/1

CVE-2024-30346 is a critical vulnerability in Foxit PDF Reader that allows remote code execution. This AcroForm Use-After-Free vulnerability requires user interaction, such as opening a malicious PDF file, to exploit. With an SVRS of 30, the threat is considered moderate, though it still warrants attention given the potential for arbitrary code execution. The flaw lies in the handling of Doc objects within AcroForms, where the lack of object validation allows attackers to execute code within the current process's context. This can lead to full system compromise. While the CVSS score is 0, the SVRS highlights a real-world exploitability risk. Addressing this vulnerability by updating Foxit PDF Reader is crucial to protect against potential attacks.

In The Wild
2024-04-02

2024-04-03

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-30346 | Foxit PDF Reader AcroForm use after free
vuldb.com2025-04-11
CVE-2024-30346 | Foxit PDF Reader AcroForm use after free | A vulnerability, which was classified as critical, was found in Foxit PDF Reader. Affected is an unknown function of the component AcroForm Handler. The manipulation leads to use after free. This vulnerability is traded as CVE-2024-30346. It is possible to launch the attack remotely. There is no exploit available. It is recommended
vuldb.com
rss
forum
news
ZDI-24-324: Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability
2024-03-28
ZDI-24-324: Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-30346.
lockbit
zerodayinitiative.com
rss
forum

Social Media

No tweets found for this CVE

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://www.foxit.com/support/security-bulletins.html
[email protected]https://www.zerodayinitiative.com/advisories/ZDI-24-324/
GITHUBhttps://www.foxit.com/support/security-bulletins.html

CWE Details

CWE IDCWE NameDescription
CWE-416Use After FreeReferencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence