Foxit PDF Reader Installer Local Privilege Escalation via Junction Creation
CVE-2024-12753 Published on December 30, 2024
Foxit PDF Reader Link Following Local Privilege Escalation Vulnerability
Foxit PDF Reader Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the product installer. By creating a junction, an attacker can abuse the installer process to create an arbitrary file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25408.
Weakness Type
What is an insecure temporary file Vulnerability?
The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
CVE-2024-12753 has been classified to as an insecure temporary file vulnerability or weakness.
Products Associated with CVE-2024-12753
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-12753 are published in these products:
Affected Versions
Foxit PDF Reader Version 2024.2.3.25184 is affected by CVE-2024-12753Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.