CVE-2023-25743

7.5 HIGH

📋 TL;DR

This vulnerability in Firefox Focus allows malicious websites to spoof browser interface elements by entering fullscreen mode without proper user notification. Attackers could trick users into interacting with fake browser chrome, potentially leading to credential theft or malware installation. Only Firefox Focus versions before 110 and Firefox ESR before 102.8 are affected.

💻 Affected Systems

Products:
  • Firefox Focus
  • Firefox ESR
Versions: Firefox Focus < 110, Firefox ESR < 102.8
Operating Systems: All platforms where Firefox Focus runs
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Firefox Focus mobile browser. Regular Firefox desktop and mobile versions are NOT affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could create convincing fake browser interfaces to steal credentials, install malware, or trick users into performing unintended actions by mimicking legitimate browser controls.

🟠

Likely Case

Phishing attacks where users are tricked into entering credentials into fake browser interfaces or clicking malicious elements disguised as legitimate browser controls.

🟢

If Mitigated

Users would see proper fullscreen notifications and could exit fullscreen mode to verify browser authenticity, preventing spoofing attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to visit a malicious website, but no authentication or special conditions are needed beyond that.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox Focus 110, Firefox ESR 102.8

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2023-05/

Restart Required: Yes

Instructions:

1. Open Firefox Focus app store (Google Play Store or Apple App Store). 2. Check for updates. 3. Install Firefox Focus version 110 or later. 4. Restart the browser.

🔧 Temporary Workarounds

Disable JavaScript

all

Prevents malicious websites from executing JavaScript that triggers fullscreen mode spoofing.

Settings → Privacy & Security → Disable JavaScript

Use Regular Firefox

all

Switch to regular Firefox browser which is not affected by this vulnerability.

🧯 If You Can't Patch

  • Avoid visiting untrusted websites with Firefox Focus
  • Educate users to look for fullscreen notifications and exit fullscreen mode if browser interface looks suspicious

🔍 How to Verify

Check if Vulnerable:

Check Firefox Focus version in app settings. If version is below 110, the browser is vulnerable.

Check Version:

Open Firefox Focus → Settings → About Firefox Focus

Verify Fix Applied:

After updating, verify version is 110 or higher in app settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual fullscreen mode activations
  • User reports of suspicious browser interfaces

Network Indicators:

  • Connections to known malicious domains that could host spoofing pages

SIEM Query:

Not applicable for mobile browser vulnerabilities

🔗 References

📤 Share & Export