Impact
This vulnerability lies in the Networking component of Mozilla Firefox and Thunderbird, allowing a malicious actor to gain higher privileges on the affected host system. The flaw represents a weakness in permissions and privilege management (CWE-266) and can lead to escalation of privileges (CWE-269). The result is that an attacker can perform actions normally restricted to privileged users, potentially compromising data integrity and confidentiality on the host.
Affected Systems
Affected systems include all installations of Mozilla Firefox older than version 150 or the ESR 140.10 release, as well as all Mozilla Thunderbird releases earlier than version 150 or the 140.10 ESR release. These pre‑fix versions are vulnerable because the exploit code remains present in their Networking components.
Risk and Exploitability
The CVSS score of 8.8 signals high severity. The EPSS score is less than 1%, indicating that while exploitation potential is low, the impact of a successful attack is significant. The vulnerability is not listed in the CISA KEV catalog, suggesting no publicly known active exploitation at the time of this analysis. The attack vector is not explicitly described, but given that the problem resides within a networking component, it is inferred that the flaw could be triggered via malicious network traffic or local requests that abuse the component.
OpenCVE Enrichment
Debian DLA
Debian DSA