Impact
The IP Protection component in Mozilla Firefox fails to protect sensitive data, resulting in information disclosure. The vulnerability allows an attacker to obtain data that should be kept private, potentially compromising user confidentiality. The weakness aligns with the Information Exposure category, where data is exposed to unauthorized parties.
Affected Systems
Mozilla Firefox versions prior to 150 are affected, as the bug was fixed in Firefox 150. No specific earlier versions are listed, but all releases before 150 may be vulnerable.
Risk and Exploitability
The CVSS score is not provided, and the EPSS score is not available, which suggests the exploitation probability is not well known. Since the vulnerability is not listed in the CISA KEV catalog, it has not yet been reported as being exploited in the wild. The attack likely requires the user to trigger the IP Protection component, but the exact attack vector is unspecified; the information exposure could be triggered locally or via a maliciously crafted resource. Without definitive data, the risk remains moderate but could increase if the exposed data is highly sensitive.
OpenCVE Enrichment