Impact
The vulnerability is a Use‑After‑Free in the content process side of a WebTransport connection within Mozilla Firefox and Thunderbird. It occurs when a WebTransport object is freed yet later accessed, leading to a crash. The description indicates that the crash is potentially exploitable, meaning that under certain memory conditions an attacker could trigger the bug to execute arbitrary code on the system. This memory corruption flaw is classified as CWE‑416.
Affected Systems
Mozilla Firefox versions 136 and all earlier releases, including Extended Support Release 115.21 and 128.8, are vulnerable. Mozilla Thunderbird versions 136 and all earlier releases, including ESR 115.21 and 128.8, are also affected. Additionally, older, bundled Mozilla binaries found on Red Hat Enterprise Linux 8, 9 and other Red Hat derivatives are impacted by these vulnerable versions.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation at present. The vulnerability is not listed in CISA KEV. Based on the description, it is inferred that an attacker could trigger the flaw by loading malicious content that initiates a WebTransport connection, potentially from a remote web page. The risk is therefore a high‑severity crash with the possibility of remote code execution under the right conditions.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN