Description
Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
Published: 2026-02-24
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Sandbox escape, potentially allowing an attacker to gain file system access from a sandboxed process
Action: Immediate Patch
AI Analysis

Impact

The vulnerability originates from improper boundary checks in the Telemetry component of Mozilla products. By exploiting this flaw, an attacker can escape from the security sandbox that normally isolates browser or email client processes, thereby potentially accessing the underlying file system or executing arbitrary code. This weakness falls under CWE-119 (Buffer Overflow or Corruption). The impact is a loss of confidentiality, integrity, and availability for users running affected versions.

Affected Systems

Mozilla Firefox (all releases, including ESR) and Mozilla Thunderbird (all releases, including ESR) are affected. The fix was applied in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8. Earlier versions lack the necessary boundary checks and remain vulnerable.

Risk and Exploitability

The CVSS score is 10, indicating a critical level of risk. EPSS indicates a very low but non-zero exploitation probability (<1%). The vulnerability is not listed in CISA’s KEV catalog. Attackers would likely deliver malicious content through a web page, extension, or phishing email that triggers the Telemetry component, after which they could use the sandbox escape to read or write arbitrary files. No additional attack prerequisites are noted beyond the presence of the vulnerable software.

Generated by OpenCVE AI on April 15, 2026 at 15:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Mozilla Firefox to version 148 or newer, or to Firefox ESR 115.33 or 140.8 where applicable.
  • Upgrade Mozilla Thunderbird to version 148 or newer, or to Thunderbird ESR 140.8 where applicable.
  • Ensure the organization’s update policy automatically installs security patches, or apply the patch manually on all affected machines.

Generated by OpenCVE AI on April 15, 2026 at 15:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4495-1 thunderbird security update
Debian DLA Debian DLA DLA-4496-1 firefox-esr security update
Debian DSA Debian DSA DSA-6152-1 thunderbird security update
History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8. Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.

Mon, 02 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 28 Feb 2026 04:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Wed, 25 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 10.0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla firefox
Mozilla firefox Esr
Mozilla thunderbird
Vendors & Products Mozilla
Mozilla firefox
Mozilla firefox Esr
Mozilla thunderbird

Wed, 25 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}

threat_severity

Important


Tue, 24 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
Description Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8. Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
References

Tue, 24 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
Description Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
Title Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software
References

Subscriptions

Mozilla Firefox Firefox Esr Thunderbird
cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-04-16T14:31:49.143Z

Reserved: 2026-02-19T15:06:01.828Z

Link: CVE-2026-2776

cve-icon Vulnrichment

Updated: 2026-02-28T03:19:29.385Z

cve-icon NVD

Status : Modified

Published: 2026-02-24T14:16:26.023

Modified: 2026-04-13T15:17:24.590

Link: CVE-2026-2776

cve-icon Redhat

Severity : Important

Publid Date: 2026-02-24T13:33:12Z

Links: CVE-2026-2776 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:15:10Z

Weaknesses