Impact
The vulnerability is a memory safety bug that existed in Firefox ESR 128.9 and Thunderbird 128.9, causing memory corruption that could be leveraged to run arbitrary code. It represents a buffer overflow and classic buffer overrun weakness (CWE-119, CWE-120) and has a CVSS score of 8.1, indicating high severity.
Affected Systems
Affected products are Mozilla Firefox ESR and Thunderbird ESR. All releases prior to 128.10 are impacted, including 128.9. The bug is relevant to installations on systems identified by the supplied CPE strings, such as Red Hat Enterprise Linux 8 and 9 and their extended support variants.
Risk and Exploitability
The EPSS score is less than 1%, indicating a low current exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. The most likely attack path is remote, involving malicious content rendered by the browser—such as a crafted web page or a deceptive email—to trigger the memory corruption and potentially execute arbitrary code. No public exploit is known, but the high CVSS score warrants proactive mitigation.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN