[CIVN-2026-0095] Multiple Vulnerabilities in Mozilla Products

By Published On: February 20, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Mozilla Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Mozilla Firefox versions prior to 147.0.4

Mozilla Firefox ESR versions prior to 115.32.1

Mozilla Firefox ESR versions prior to 140.7.1

Mozilla Thunderbird versions prior to 140.7.2

Mozilla Thunderbird versions prior to 147.0.2 

Mozilla Firefox for iOS versions prior to 147.2.1

Overview


Multiple vulnerabilities have been reported in Mozilla products which could be exploited by a remote attacker to execute arbitrary code on the targeted system.


Target Audience:

All end-user organizations and individuals using Mozilla Products.


Risk Assessment:

High risk of unauthorized access to sensitive information.


Impact Assessment:

Potential for data theft, sensitive information disclosure and complete compromise of system.


Description


Mozilla Firefox is a free and open-source web browser developed by Mozilla foundation, while Firefox ESR (Extended support Release) is a stable version tailored for organizations that re-quire long-term support with only security and maintenance updates.


Multiple vulnerabilities exist in Mozilla products due to Heap buffer overflow in libvpx; Interrupted page loads in new tabs could allow website spoofing under trusted domains. A remote attacker could exploit these vulnerabilities by convincing a victim to open a specially crafted web request.


Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code on the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor:

https://www.mozilla.org/en-US/security/advisories/mfsa2026-09/


https://www.mozilla.org/en-US/security/advisories/mfsa2026-10/


https://www.mozilla.org/en-US/security/advisories/mfsa2026-11/



References


Mozilla

https://www.mozilla.org/en-US/security/advisories/mfsa2026-09/

https://www.mozilla.org/en-US/security/advisories/mfsa2026-10/

https://www.mozilla.org/en-US/security/advisories/mfsa2026-11/


CVE Name

CVE-2026-2447

CVE-2026-2032




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmYengACgkQ3jCgcSdc

ys//Hg/8D/tqq6H3DUOuPZbZLiiaXx0ZKTxwci7VSS42rHciAU/6DadxypAKmIR7

TW2I6o6MqH4MUGGNBbQawoPonPQBkMcoF5mHd7e6eeU8tl7RIQ/NDiKOpZhwHkwO

kQK7pGD/G0omRe9+jaySRUpKFV2JjUKKs/LjmfaD0z307rcmizzVr8QngjV4La8h

c0kmGIpDHM8YDKNSSDXLinAQFO/qZ6lA9cGxJIytfnKOpC3IoC+e6HxdLI3Vgqaa

qb+uZFOqwEN33dhpPYkNUUmc933EopEiSEeb3+YC8z7Yd+lLYqXSN7Xd8oHxUZdU

At5FaE55vG76mkw7WvQ4tu8q9wL0bV+k6G/D92BRx31AtGEcshpYvjaQrDGUKExh

ZKEtdldRewu0WmOJM5MilNO0ghX7tt8n6RNUvjz3sr2A3XNnHCwXsC9GjfGVtLal

uB0PAk/gO7r1hzdUxuSRkDPMo31iGL8FJ6RL/3CcuDTgwTw0MK7jcOGfqTA3Rszs

Gv9+gA7xyJB99iCnQAQUYpUkOkcfJ4etKG7gbXv4XmdnFmpM6WYKmHWlKLmOgZOU

LncxT8nXJRlZWoB2IfQdA0TQvglEjjeeGNZULDNkL8MLRgXSkItbxTPD1tssg9x5

EHIyZkzxVMWlyakOmR/xK+0AhIMMv3XeD4VDpQS6noItfjO/jCE=

=b9eD

—–END PGP SIGNATURE—–

Share this article