Impact
Memory safety bugs in Mozilla Firefox allowed malicious content to corrupt memory, potentially enabling an attacker to execute arbitrary code. The flaws fall under CWE‑119 and CWE‑416, indicating buffer overflows and use‑after‑free conditions. The official assessment suggests that a skilled attacker could exploit these weaknesses to gain full control over the vulnerable instance.
Affected Systems
Mozilla Firefox versions prior to 148.0.2 are vulnerable. The issue has been fixed in Firefox 148.0.2, so any installation older than that release is at risk. Current users of the 148.0.2 or later releases are not affected.
Risk and Exploitability
The CVSS score of 8.8 highlights a high severity, with almost no exploitation probability reported in EPSS (<1%). The vulnerability is not listed in the CISA KEV catalog, indicating no publicly known active exploits yet. Attackers would most likely target users via crafted web content or malicious extensions that trigger the memory corruptions, as the bug operates in the rendering engine and extension handling pathways.
OpenCVE Enrichment