The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-28672

CVE-2022-28672: Foxit PDF Editor RCE Vulnerability

CVE-2022-28672 is a remote code execution flaw in Foxit PDF Editor that allows attackers to execute arbitrary code through malicious PDF files. This post covers technical details, affected versions, impact, and mitigation.

Published: February 17, 2026

CVE-2022-28672 Overview

CVE-2022-28672 is a Use-After-Free vulnerability affecting Foxit PDF Reader and PDF Editor that enables remote attackers to execute arbitrary code on affected systems. The vulnerability exists within the handling of Doc objects in Foxit PDF Reader 11.2.1.53537 and related versions. The flaw stems from the lack of proper validation of an object's existence prior to performing operations on it, creating a dangerous memory corruption condition.

User interaction is required for exploitation—the target must visit a malicious webpage or open a specially crafted PDF file. Once exploited, an attacker can execute code in the context of the current process, potentially leading to full system compromise depending on the user's privilege level. This vulnerability was originally tracked as ZDI-CAN-16640 through the Zero Day Initiative.

Critical Impact

Remote code execution through malicious PDF documents allows attackers to gain control of affected systems with the privileges of the current user. Combined with the widespread use of PDF readers in enterprise environments, this vulnerability poses a significant risk to organizational security.

Affected Products

  • Foxit PDF Reader (versions prior to security patch)
  • Foxit PDF Editor (versions prior to security patch)
  • Microsoft Windows (as the underlying platform)

Discovery Timeline

  • 2022-07-18 - CVE-2022-28672 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2022-28672

Vulnerability Analysis

This Use-After-Free (CWE-416) vulnerability occurs within Foxit PDF Reader's JavaScript engine when handling Doc objects. The core issue arises when the application fails to validate whether an object still exists in memory before attempting to perform operations on it.

In PDF documents, Doc objects represent the document itself and provide access to various document-level operations through JavaScript. When a Doc object is freed but a reference to it remains, subsequent operations using that stale reference attempt to access deallocated memory. This creates a Use-After-Free condition that can be exploited to achieve arbitrary code execution.

The exploitation requires user interaction—either visiting a malicious webpage containing an embedded PDF or opening a weaponized PDF file directly. Once the malicious document is processed, the attacker-controlled JavaScript triggers the Use-After-Free condition, potentially allowing execution of arbitrary code with the privileges of the current user.

Root Cause

The vulnerability stems from improper object lifecycle management in Foxit PDF Reader's Doc object handler. The application fails to properly track and validate object references after memory deallocation, allowing dangling pointers to persist. When these invalid references are subsequently dereferenced, the application accesses freed memory that may have been reallocated for other purposes or contain attacker-controlled data.

This is a classic Use-After-Free pattern where the temporal relationship between object destruction and reference usage is not properly enforced, leading to memory safety violations.

Attack Vector

The attack vector for CVE-2022-28672 requires local file access or web-based delivery:

  1. Malicious PDF File Delivery: An attacker crafts a specially designed PDF document containing JavaScript that manipulates Doc objects to trigger the Use-After-Free condition. The file can be delivered via email attachment, file sharing, or direct download.

  2. Web-Based Attack: A malicious webpage can embed or reference a weaponized PDF that is automatically processed by Foxit PDF Reader when the victim visits the page with the browser plugin enabled.

  3. Memory Manipulation: The attacker's JavaScript code creates specific object allocation and deallocation patterns to set up the Use-After-Free condition, then triggers an operation on the freed Doc object to achieve code execution.

The vulnerability mechanism involves JavaScript within the PDF document manipulating Doc objects in a way that leaves dangling references after object deallocation. Technical details of the exploitation technique are available through the Zero Day Initiative Advisory ZDI-22-763.

Detection Methods for CVE-2022-28672

Indicators of Compromise

  • Suspicious PDF files containing obfuscated or heavily nested JavaScript code targeting Doc objects
  • Unexpected child processes spawned by FoxitPDFReader.exe or FoxitPhantomPDF.exe
  • Memory access violations or crash dumps from Foxit PDF Reader indicating heap corruption
  • Network connections initiated by Foxit PDF processes following PDF document opening

Detection Strategies

  • Deploy endpoint detection rules to monitor for anomalous behavior from Foxit PDF Reader processes, including unexpected process spawning or memory access patterns
  • Implement file inspection capabilities to identify PDF documents containing suspicious JavaScript that manipulates Doc objects
  • Configure application whitelisting to prevent unauthorized executables from running in the context of PDF reader processes
  • Monitor for Foxit PDF Reader crashes that may indicate exploitation attempts, particularly those involving heap corruption signatures

Monitoring Recommendations

  • Enable enhanced logging for PDF reader applications to capture JavaScript execution events and document processing activity
  • Implement network monitoring to detect command-and-control communications following PDF document access
  • Deploy memory protection technologies that can detect Use-After-Free exploitation attempts at runtime
  • Establish baseline process behavior for Foxit PDF Reader to identify deviations indicative of exploitation

How to Mitigate CVE-2022-28672

Immediate Actions Required

  • Update Foxit PDF Reader and Foxit PDF Editor to the latest patched versions immediately
  • Disable JavaScript execution in Foxit PDF Reader through Preferences > JavaScript > Enable JavaScript Actions (uncheck)
  • Implement email gateway filtering to scan and quarantine suspicious PDF attachments
  • Consider temporarily switching to alternative PDF readers until patches are applied in environments with high-risk exposure

Patch Information

Foxit has released security updates to address this vulnerability. Administrators should consult the Foxit Security Bulletin for the latest patched versions and apply updates across all affected systems.

Organizations should prioritize patching workstations where users regularly open PDF documents from untrusted sources, including email attachments and web downloads. The patched versions include proper object validation checks that prevent the Use-After-Free condition from being triggered.

Workarounds

  • Disable JavaScript in Foxit PDF Reader via Edit > Preferences > JavaScript > uncheck "Enable JavaScript Actions"
  • Configure Foxit PDF Reader to run in Protected Mode/Safe Reading Mode to limit the impact of potential exploitation
  • Implement application sandboxing or containerization for PDF reader processes to contain any successful exploitation
  • Block PDF attachments from untrusted sources at the email gateway level until patches can be applied
bash
# Disable JavaScript in Foxit PDF Reader via registry (Windows)
reg add "HKEY_CURRENT_USER\Software\Foxit Software\Foxit PDF Reader\Preferences" /v "bEnableJS" /t REG_DWORD /d 0 /f

# For enterprise deployment, apply via Group Policy or management tools
# Verify the setting is applied across all managed endpoints

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechFoxit Pdf Editor

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability22.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-416
  • Technical References
  • Zero Day Initiative Advisory ZDI-22-763
  • Vendor Resources
  • Foxit Security Bulletin
  • Related CVEs
  • CVE-2023-27363: Foxit PDF Editor RCE Vulnerability

  • CVE-2024-7725: Foxit PDF Editor RCE Vulnerability

  • CVE-2026-1591: Foxit PDF Editor Cloud XSS Vulnerability

  • CVE-2026-1592: Foxit PDF Editor Cloud XSS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English