Impact
A malformed StreamData sent over AudioIPC from a content process can trigger a use‑after‑free in the Browser process on Windows, which could allow an attacker to escape the browser sandbox and execute code with the Browser’s elevated privileges. The primary impact is a sandbox escape, and the underlying weakness is a use‑after‑free (CWE‑416).
Affected Systems
Mozilla Firefox and Thunderbird running on Windows are affected. The vulnerability is present in all versions before Firefox 136 (or Firefox ESR 115.21/128.8) and before Thunderbird 136 (or Thunderbird ESR 128.8). Upgrading to those patched releases removes the flaw.
Risk and Exploitability
With a CVSS score of 8.8 the issue is classified as high severity, while the EPSS score of less than 1% indicates a low probability of exploitation at the time of this analysis. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is a Windows system where a content process can read audio data, such as a web page or a local file, and inject crafted StreamData that triggers the use‑after‑free in the Browser process.
OpenCVE Enrichment
EUVD
Ubuntu USN