Impact
A flaw in the Widget: Win32 component allows a malicious page to bypass the browser sandbox by exploiting incorrect boundary checks. The bug can lead to execution with higher privileges than the sandbox grants, potentially compromising the confidentiality, integrity, and availability of the host system. The issue is resolved by adding proper bounds checking to the component.
Affected Systems
Mozilla Firefox, all builds prior to Firefox 151 and Firefox ESR 140.11, were affected. The security update was released for Firefox 151 and Firefox ESR 140.11 and later versions.
Risk and Exploitability
No CVSS score is provided and the EPSS score is not available, but the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote, originating from a malicious web page or content delivered through the affected component. The risk is elevated given the potential for sandbox escape, but the exploitation probability remains unknown.
OpenCVE Enrichment