{"api_version":"1","generated_at":"2026-04-23T00:42:19+00:00","cve":"CVE-2022-22150","urls":{"html":"https://cve.report/CVE-2022-22150","api":"https://cve.report/api/cve/CVE-2022-22150.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-22150","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-22150"},"summary":{"title":"CVE-2022-22150","description":"A memory corruption vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger an exception which is improperly handled, leaving the engine in an invalid state, which can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.","state":"PUBLIC","assigner":"talos-cna@cisco.com","published_at":"2022-02-04 23:15:00","updated_at":"2022-06-16 15:38:00"},"problem_types":["CWE-755"],"metrics":[],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1439","name":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1439","refsource":"MISC","tags":[],"title":"TALOS-2022-1439 ||  Cisco Talos Intelligence Group - Comprehensive Threat Intelligence","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-22150","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22150","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"22150","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"foxit","cpe5":"pdf_reader","cpe6":"11.1.0.52543","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-22150","qid":"376764","title":"Foxit Reader and Foxit PDF Editor Prior to 11.2.1 Multiple Security Vulnerabilities"},{"cve":"CVE-2022-22150","qid":"376802","title":"Foxit PhantomPDF Prior to 10.1.7 Multiple Security Vulnerabilities"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-22150","ASSIGNER":"talos-cna@cisco.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Foxit","version":{"version_data":[{"version_value":"Foxit Reader 11.1.0.52543"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-460: Improper Cleanup on Thrown Exception"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1439","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1439"}]},"description":{"description_data":[{"lang":"eng","value":"A memory corruption vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger an exception which is improperly handled, leaving the engine in an invalid state, which can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled."}]},"impact":{"cvss":{"baseScore":8.8,"baseSeverity":"High","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.0"}}},"nvd":{"publishedDate":"2022-02-04 23:15:00","lastModifiedDate":"2022-06-16 15:38:00","problem_types":["CWE-755"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:foxit:pdf_reader:11.1.0.52543:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"22150","Ordinal":"225112","Title":"CVE-2022-22150","CVE":"CVE-2022-22150","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"22150","Ordinal":"1","NoteData":"A memory corruption vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger an exception which is improperly handled, leaving the engine in an invalid state, which can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.","Type":"Description","Title":null},{"CveYear":"2022","CveId":"22150","Ordinal":"2","NoteData":"2022-02-04","Type":"Other","Title":"Published"},{"CveYear":"2022","CveId":"22150","Ordinal":"3","NoteData":"2022-02-04","Type":"Other","Title":"Modified"}]}}}