Impact
A flaw in the IP Protection component of Mozilla Firefox allows an attacker to read data that should remain private. The vulnerability is an information exposure weakness that could expose proprietary or confidential content. It is not clear from the advisory how the flaw is triggered, but the component’s interaction with IP‑dependent data suggests that exploitation may require access to the vulnerable code path, either through a crafted page or a local user action. The likely attack vector therefore is not explicitly stated but could involve user‑initiated content that engages the IP Protection logic.
Affected Systems
Firefox versions before 151 contain the flaw. The security fix was introduced in Firefox 151; any install at that version or newer is not vulnerable. No other vendors or products are mentioned in the advisory.
Risk and Exploitability
Because no CVSS or EPSS score is available, the severity cannot be quantified. The flaw is not listed in CISA’s KEV catalog, and there is no known public exploit. Nonetheless, any attacker who can interact with a vulnerable instance of Firefox could access the exposed data, so the potential impact on confidentiality remains until the fix is applied.
OpenCVE Enrichment