Aula 3 - Ferramentas “Mão”🖐🏽, “Selecionar Texto e Imagem” e “Selecionar Anotação” no Foxit PDF: https://youtu.be/F4KAXq8jAgo
Aula 3 - Ferramentas “Mão”🖐🏽, “Selecionar Texto e Imagem” e “Selecionar Anotação” no Foxit PDF: https://youtu.be/F4KAXq8jAgo
Aula 2 - Diferentes formas de se abrir arquivos/documentos .pdf no Foxit PDF: https://youtu.be/dLf7p41LF6E
#FoxitPDF #TutorialFoxit #PDFTools #SelecionarTexto #SelecionarImagem #SelecionarAnotacao #FerramentasPDF #EdicaoPDF #ProdutividadeDigital #AulaOnline #MauricioCassemiro #TutorialPDF #PDF #EditorPDF #Foxit
#FoxitPDF Editor und Reader: Attacken über präparierte PDF-Dateien möglich | Security https://www.heise.de/news/Foxit-PDF-Editor-und-Reader-Attacken-ueber-praeparierte-PDF-Dateien-moeglich-10211267.html #Foxit #Patchday
#FoxitPDF: Manipulierte PDFs können Schadcode durchschleusen | Security https://www.heise.de/news/Foxit-PDF-Manipulierte-PDFs-koennen-Schadcode-durchschleusen-9955308.html #Patchday
Danke #foxitPDF für diese Add-On policy, dass ich die KI-Tools und HelpCenter deaktivieren kann 🤘
https://kb.foxit.com/s/articles/23978226389268-How-to-disable-AI-Assistant-and-Support-Center
Foxit PDF Reader Users Targeted by Malicious PDF Exploit
Date: May 15, 2024
CVE: CVE-2023-36033
Vulnerability Type: Remote Code Execution (RCE)
CWE: [[CWE-20]], [[CWE-78]], [[CWE-94]]
Sources: GBHackers, Checkpoint Research
Issue Summary
Researchers have identified a critical vulnerability in Foxit PDF Reader that allows attackers to execute malicious code on users' systems by exploiting a design flaw in the application's security warnings. The flaw makes it easy for attackers to trick users into approving malicious actions, leading to unauthorized access and data theft.
Technical Key Findings
The vulnerability stems from Foxit Reader's handling of security warnings, which default to an "OK" option. This flaw enables attackers to craft malicious PDFs that, when opened, prompt the user to approve actions unknowingly. Once approved, these actions can download and execute malicious code from a remote server, bypassing standard security detections.
Vulnerable Products
Impact Assessment
Exploitation of this vulnerability can lead to severe consequences, including unauthorized access to sensitive data, remote control of the affected device, and the ability to deploy various malware such as VenomRAT, Agent-Tesla, and others. This can result in data breaches, espionage, and further propagation of malware.
Patches or Workarounds
Foxit has acknowledged the issue and that it would be resolved in version 2024 3.
Tags
#FoxitPDF #CVE2023-36033 #RemoteCodeExecution #Malware #CyberSecurity #APT #VulnerabilityPatch #DataBreach
📬 Foxit PDF Exploit: Ein unbedachter Klick löst Angriffskette aus
#ITSicherheit #AgentTesla #DoNotTeam #Exploid #FOXITPDF #FoxitReader #pdf https://sc.tarnkappe.info/17d3b6
Sicherheitsupdates: #FoxitPDF unter macOS und Windows verwundbar | Security https://www.heise.de/news/Sicherheitsupdates-Foxit-PDF-unter-macOS-und-Windows-verwundbar-9538593.html #Patchday
Sicherheitsupdates: Schadcode-Schlupflöcher in #FoxitPDF geschlossen | Security https://www.heise.de/news/Sicherheitsupdates-Schadcode-Schlupfloecher-in-Foxit-PDF-geschlossen-9303972.html #Patchday
Mehrere Schadcode-Lücken in #FoxitPDF geschlossen | Security https://www.heise.de/news/Mehrere-Schadcode-Luecken-in-Foxit-PDF-geschlossen-8974063.html #Patchday