[CIVN-2025-0360] Multiple Vulnerabilities in Mozilla Products

By Published On: December 15, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Mozilla Products 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Mozilla Firefox for ESR versions prior to 115.31
Mozilla Firefox for ESR versions prior to 140.6
Mozilla Firefox versions prior to 146
Overview
Multiple vulnerabilities have been reported in Mozilla products which could be exploited by a remote attacker to execute arbitrary code, gain elevated privileges, perform spoofing attack or bypass security restriction on the targeted system.
Target Audience:
All end-user organizations and individuals using Mozilla Products.
Risk Assessment:
High risk of remote code execution.
Impact Assessment:
Potential for data theft, sensitive information disclosure and complete compromise of system.
Description
Mozilla Firefox is a free and open-source web browser developed by Mozilla foundation, while Firefox ESR (Extended support Release) is a stable version tailored for organizations that re-quire long-term support with only security and maintenance updates.
Multiple vulnerabilities exist in Mozilla products due to Use-after-free in the WebRTC: Signaling component and Audio/Video: GMP component; Incorrect boundary conditions in the Graphics: CanvasWebGL component; Privilege escalation in the DOM: Notifications component; JIT mis-compilation in the JavaScript Engine: JIT component; Privilege escalation in the Netmonitor component; Same origin policy bypass in the Request Handling component; Memory safety bugs. A remote    attacker could exploit these vulnerabilities by convincing a victim to open a specially crafted web request.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, gain elevated privileges, perform spoofing attack or bypass security restriction on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-93/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-94/
References
Mozilla
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-93/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-94/
CVE Name
CVE-2025-14321
CVE-2025-14322
CVE-2025-14323
CVE-2025-14324
CVE-2025-14325
CVE-2025-14326
CVE-2025-14327
CVE-2025-14328
CVE-2025-14329
CVE-2025-14330
CVE-2025-14331
CVE-2025-14332
CVE-2025-14333
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=FjdT
—–END PGP SIGNATURE—–

Share this article