// For flags

CVE-2022-26486

Mozilla Firefox Use-After-Free Vulnerability

Severity Score

9.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.

Un mensaje inesperado en el framework IPC de WebGPU podrĂ­a provocar un escape de la sandbox explotable y de use-after-free. Hemos recibido informes de ataques en la naturaleza que abusan de esta falla. Esta vulnerabilidad afecta a Firefox &lt; 97.0.2, Firefox ESR &lt; 91.6.1, Firefox para Android &lt; 97.3.0, Thunderbird &lt; 91.6.2 y Focus &lt; 97.3.0.

An unexpected message in the WebGPU IPC framework could lead to an exploitable sandbox escape and a use-after-free issue. An attacker with enough privileges could exploit this flaw leading to a complete system compromise

A use-after-free was discovered when removing an XSLT parameter in some circumstances. If a user were tricked into opening a specially crafted website, an attacker could exploit this to cause a denial of service, or execute arbitrary code. A use-after-free was discovered in the WebGPU IPC framework. If a user were tricked into opening a specially crafted website, an attacker could exploit this to cause a denial of service, or execute arbitrary code.

Mozilla Firefox contains a use-after-free vulnerability in WebGPU IPC Framework which can be exploited to perform arbitrary code execution.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2022-03-04 CVE Reserved
  • 2022-03-07 CVE Published
  • 2022-03-07 Exploited in Wild
  • 2022-03-21 KEV Due Date
  • 2025-01-28 CVE Updated
  • 2025-01-28 First Exploit
  • 2025-03-30 EPSS Updated
CWE
  • CWE-416: Use After Free
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
< 97.0.2
Search vendor "Mozilla" for product "Firefox" and version " < 97.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
< 97.3.0
Search vendor "Mozilla" for product "Firefox" and version " < 97.3.0"
android
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
< 91.6.1
Search vendor "Mozilla" for product "Firefox Esr" and version " < 91.6.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Focus
Search vendor "Mozilla" for product "Firefox Focus"
< 97.3.0
Search vendor "Mozilla" for product "Firefox Focus" and version " < 97.3.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
< 91.6.2
Search vendor "Mozilla" for product "Thunderbird" and version " < 91.6.2"
-
Affected