Impact
JIT miscompilation in the JavaScript engine’s JIT component can cause the browser or email client to execute incorrect code paths. The flaw is rated with a CVSS score of 9.8, indicating that an attacker who can trigger the miscompilation may gain arbitrary code execution privileges, compromising system confidentiality, integrity, and availability.
Affected Systems
Mozilla Firefox versions earlier than 146 and ESR builds earlier than 115.31 or 140.6, as well as Mozilla Thunderbird earlier than 146 and ESR builds earlier than 140.6, are vulnerable. The impacted products include the standard and Enterprise Support Release (ESR) editions of Firefox and Thunderbird.
Risk and Exploitability
Because the vulnerability is tied to the JavaScript engine, exploitation likely requires delivery of crafted JavaScript code – either via a malicious web page or an email containing executable scripts. The EPSS score is below 1 %, suggesting that known exploits are rare or still immature. The vulnerability is not listed in the CISA KEV catalog, but its high CVSS rating and the ability to achieve remote code execution mean that timely patching is essential.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN