Impact
The report identifies a use‑after‑free flaw in Foxit PDF Editor and Reader that arises during page lifecycle management. Invalidating internal components while the document structure changes causes the application to reference freed memory, leading to a crash. The consequence for users is a denial of service, as the program terminates when the vulnerability is triggered.
Affected Systems
Foxit Software Inc. products are affected, specifically Foxit PDF Editor and Foxit PDF Reader. Version information is not supplied in the advisory, so it is unclear which releases contain the flaw.
Risk and Exploitability
The vulnerability receives a moderate CVSS score of 5.5 and an EPSS score of less than 1 %, indicating it is not a high‑probability target for widespread exploitation. The issue is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker can trigger this vulnerability by crafting a malicious PDF that is opened by the victim; a malicious file could be delivered via email or a compromised website and cause the viewer to crash. This suggests the attack vector is user‑initiated via a malicious document, and the risk to business operations is mainly interruption rather than data compromise.
OpenCVE Enrichment