Impact
JIT miscompilation in the JavaScript Engine: JIT component allows the Just‑In‑Time compiler to produce incorrect machine code, which can corrupt application memory. The corruption can potentially enable a malicious actor to execute arbitrary code within the browser or its extensions. The weakness involves improper memory handling (CWE‑119), erroneous computation (CWE‑686), and data type confusion (CWE‑843).
Affected Systems
Mozilla Firefox and Thunderbird are affected. The flaw was fixed in Firefox 146 and Firefox ESR 140.6, and in Thunderbird 146 and Thunderbird ESR 140.6; earlier releases before these versions contain the vulnerability.
Risk and Exploitability
The CVSS base score of 9.8 indicates critical severity. The EPSS score of < 1 % indicates that widespread exploitation has not yet been observed. Based on the description, the likely attack vector is a malicious JavaScript payload served from an untrusted web page or resource, allowing the miscompilation to be triggered remotely. The vulnerability is not listed in CISA’s KEV catalog, so no public exploits are known, but a zero‑day exploitation remains a possibility until the affected builds are updated.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN