// For flags

CVE-2020-26964

 

Severity Score

6.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

Si la funcionalidad Remote Debugging via USB estaba habilitada en Firefox para Android en una versión de Android anterior a Android 6.0, las aplicaciones no confiables podrían haberse conectado a la funcionalidad y operar con los privilegios del navegador para leer e interactuar con el contenido web.&#xa0;La funcionalidad fue implementada como un socket de dominio Unix, protegido por la política SELinux de Android;&#xa0;sin embargo, SELinux no se aplicó para versiones anteriores a 6.0.&#xa0;Esto se corrigió al eliminar la funcionalidad Remote Debugging via USB de los dispositivos afectados.&#xa0;*Nota: este problema solo afectó a Firefox para Android.&#xa0;Otros sistemas operativos no están afectados.*.&#xa0;Esta vulnerabilidad afecta a Firefox versiones anteriores a 83

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-12 CVE Reserved
  • 2020-12-09 CVE Published
  • 2023-08-24 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
< 83.0
Search vendor "Mozilla" for product "Firefox" and version " < 83.0"
android
Affected
in Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
< 6.0
Search vendor "Google" for product "Android" and version " < 6.0"
-
Safe