
[CIVN-2026-0261] Multiple Vulnerabilities in Mozilla Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Mozilla Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Mozilla Firefox versions prior to 151
Mozilla Firefox ESR versions prior to 115.36
Mozilla Firefox ESR versions prior to 140.11
Mozilla Firefox for iOS versions prior to 151.0
Mozilla Thunderbird versions prior to 140.11
Mozilla Thunderbird versions prior to 151
Overview
Multiple vulnerabilities have been reported in Mozilla products which could be exploited by a remote attacker to execute arbitrary code, obtain sensitive information, perform spoofing attack, bypass security restriction or cause Denial of service (DoS) condition on the targeted system.
Target Audience:
All end-user organizations and individuals using Mozilla Products.
Risk Assessment:
High risk of unauthorized access to sensitive information.
Impact Assessment:
Potential for data theft, sensitive information disclosure and complete compromise of system.
Description
Mozilla Firefox is a free and open-source web browser developed by Mozilla foundation, while Firefox ESR (Extended support Release) is a stable version tailored for organizations that require long-term support with only security and maintenance updates.
Multiple vulnerabilities exist in Mozilla products due to invalid pointer in the Audio/Video: Web Codecs component; Incorrect boundary conditions in the Audio/Video: Web Codecs component JavaScript Engine: JIT component, Integer overflow in the Audio/Video component; Information disclosure in the DOM: Security component, Graphics: WebGPU component, IP Protection component; Sandbox escape in the Security: Process Sandboxing component; Integer overflow in the Networking: JAR component, Widget: Win32 component; Issue in JavaScript Engine component; Memory safety bugs, Mitigation bypass in the DOM: Security component, Privilege escalation in the Application Update component, DOM: Workers component, Enterprise Policies component, Security component, WebRTC: Audio/Video component; Same-origin policy bypass in the DOM: Networking component, Networking: HTTP component, Networking: JAR component; Incorrect boundary conditions in the Widget: Win32 component; Use-after-free in the Dis-ability Access APIs component; Sandbox escape in Profile Backup component; Spoofing issue in the Form Autofill component, Popup Blocker component, Toolbar component in Firefox for Android, Web Speech component, WebExtensions; Use-after-free in the DOM: Bindings (WebIDL) component. A remote attacker could exploit these vulnerabilities by convincing a victim to open a specially crafted web request.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, perform spoofing attack, bypass security restriction or cause Denial of service (DoS) condition on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-51/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-50/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-49/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-48/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-47/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-46/
References
Mozilla
https://www.mozilla.org/en-US/security/advisories/mfsa2026-51/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-50/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-49/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-48/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-47/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-46/
CVE Name
CVE-2026-8388
CVE-2026-8391
CVE-2026-8401
CVE-2026-8706
CVE-2026-8945
CVE-2026-8946
CVE-2026-8947
CVE-2026-8948
CVE-2026-8949
CVE-2026-8950
CVE-2026-8951
CVE-2026-8952
CVE-2026-8953
CVE-2026-8954
CVE-2026-8955
CVE-2026-8956
CVE-2026-8957
CVE-2026-8958
CVE-2026-8959
CVE-2026-8960
CVE-2026-8961
CVE-2026-8962
CVE-2026-8963
CVE-2026-8964
CVE-2026-8965
CVE-2026-8966
CVE-2026-8967
CVE-2026-8968
CVE-2026-8969
CVE-2026-8970
CVE-2026-8971
CVE-2026-8972
CVE-2026-8973
CVE-2026-8974
CVE-2026-8975
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=yZ9s
—–END PGP SIGNATURE—–


