// For flags

CVE-2020-15663

 

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

If Firefox is installed to a user-writable directory, the Mozilla Maintenance Service would execute updater.exe from the install location with system privileges. Although the Mozilla Maintenance Service does ensure that updater.exe is signed by Mozilla, the version could have been rolled back to a previous version which would have allowed exploitation of an older bug and arbitrary code execution with System Privileges. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 80, Thunderbird < 78.2, Thunderbird < 68.12, Firefox ESR < 68.12, and Firefox ESR < 78.2.

Si Firefox está instalado en un directorio escribible por el usuario, el Servicio de Mantenimiento de Mozilla ejecutará el archivo updater.exe desde la ubicación de instalación con privilegios del sistema.&#xa0;Aunque el Servicio de Mantenimiento de Mozilla garantiza que el archivo updater.exe esté firmado por Mozilla, la versión podría haberse revertido a una versión anterior, lo que podría haber permitido una explotación de un error anterior y una ejecución de código arbitrario con Privilegios System.&#xa0;*Nota: este problema solo afectó a los sistemas operativos Windows.&#xa0;Otros sistemas operativos no están afectados.*.&#xa0;Esta vulnerabilidad afecta a Firefox versiones anteriores a 80, Thunderbird versiones anteriores a 78.2, Thunderbird versiones anteriores a 68.12, Firefox ESR versiones anteriores a 68.12 y Firefox ESR versiones anteriores a 78.2

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-07-10 CVE Reserved
  • 2020-10-01 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-05 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-427: Uncontrolled Search Path Element
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
< 80.0
Search vendor "Mozilla" for product "Firefox" and version " < 80.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
>= 68.0 < 68.12
Search vendor "Mozilla" for product "Firefox Esr" and version " >= 68.0 < 68.12"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
>= 78.0 < 78.2
Search vendor "Mozilla" for product "Firefox Esr" and version " >= 78.0 < 78.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
>= 68.0 < 68.12
Search vendor "Mozilla" for product "Thunderbird" and version " >= 68.0 < 68.12"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
>= 78.0 < 78.2
Search vendor "Mozilla" for product "Thunderbird" and version " >= 78.0 < 78.2"
-
Affected