62 vulnerabilities to be updated in Foxit Reader and Foxit PhantomPDF
This is the so-called cumulative update on the security vulnerabilities provided to the manufacturer by the Trend Micro Zero Day Initiative and Qihoo 360 Tech experts. Most of the reported vulnerabilities in the Foxit Reader and PhantomPDF software may allow an attacker to execute arbitrary code on the system remotely. So the simple use of social engineering that will lead the victim to open a malicious link may lead to the execution of arbitrary code in the context of the logged in user - usually the administrator of the Windows system.
Reported 62 vulnerabilities are not a cause for excessive panic and the world will not end there. Alternative to Adobe and, according to many, better Foxit software for reading PDF files, is installed on hundreds of thousands of machines in Poland, where their users are not always those who are responsible for security or simply lack education in this area. Updating systems and installed programs for many computer owners is still not a good habit. Therefore, if you have friends or family members who use Foxit software, please update them with the latest version 9.2.
It is possible that ready-made exploits will soon appear that give the attacker the opportunity to infect computers with any type of malicious software. At this moment, it is worth being ready now, i.e. take care of system updates and install antivirus software, preferably with a firewall or based on secure file lists.
Add new comment
Learn more about our offer
We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.