Impact
A flaw in the certificate processing code caused the length of a certificate to be unchecked when it was added to a certificate store. Only trusted data was processed, but the improper runtime validation of the certificate length (CWE-1284) and the absence of cryptographic integrity checks (CWE-295) could allow a crafted certificate to be accepted, potentially enabling an attacker to use an unauthorized identity if the application or the underlying system is tricked into trusting that certificate.
Affected Systems
Affected products are Mozilla Firefox and Mozilla Thunderbird. Versions prior to Firefox 135, ESR 128.7, Thunderbird 135 or 128.7 are vulnerable. Red Hat Enterprise Linux packages that include these browsers are also affected, as indicated by the mentioned RHEL CPEs.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity, while the EPSS score of less than 1% suggests that exploitation is currently very unlikely to be observed. The vulnerability is not listed in CISA KEV. Attackers would most likely need local access or the ability to influence the certificate store; without such access, the risk remains limited.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN