Impact
The vulnerability stems from IPC code handling in Firefox, where a compromised child process can cause the parent to return an unintentionally powerful handle. This results in a sandbox escape, allowing the attacker to bypass the isolation guarantees of the sandbox and potentially execute code with elevated privileges. The flaw is classified as CWE-668.
Affected Systems
Mozilla Firefox installations running on Windows are affected. Versions prior to 136.0.4, as well as Firefox ESR 128.8.1 and ESR 115.21.1, contain the vulnerability. Other operating systems are not impacted.
Risk and Exploitability
The CVSS score of 10 indicates critical severity, while the EPSS score of less than 1% suggests a low likelihood of widespread exploitation at current time. The vulnerability was exploited in the wild, and the attack vector involves a compromised child process interacting with IPC mechanisms. The issue is not listed in the CISA KEV catalog.
OpenCVE Enrichment
EUVD