Impact
The vulnerability originates from undefined behavior within the WebRTC: Signaling component, specifically involving improper handling of signaling data that can trigger uninitialized variable usage and related erroneous logic. These coding defects can cause the affected application to crash or enter an unintended state when processing certain signaling packets, potentially exposing the system to denial of service. The weakness aligns with CWE‑475 (Undefined Behavior) and CWE‑758 (Uninitialized Variable).
Affected Systems
Mozilla Firefox versions before 149 and Firefox ESR versions before 140.9 are vulnerable. Likewise, Mozilla Thunderbird versions before 149 and Thunderbird ESR versions before 140.9 contain the same flaw and must be updated to a fixed release.
Risk and Exploitability
The CVSS base score of 8.1 reflects a high severity vulnerability, while the EPSS score of less than 1% suggests a low likelihood of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. Based on the description, an attacker could provoke the error by delivering crafted WebRTC signaling messages over the network, potentially from a malicious web page or compromised network element, leading to application crashes or service disruption.
OpenCVE Enrichment
Debian DLA
Debian DSA