CVE-2023-37201

8.8 HIGH

📋 TL;DR

This vulnerability allows an attacker to trigger a use-after-free condition when establishing a WebRTC connection over HTTPS, potentially leading to arbitrary code execution. It affects Firefox versions below 115, Firefox ESR below 102.13, and Thunderbird below 102.13. Users of these outdated browsers and email clients are at risk.

💻 Affected Systems

Products:
  • Mozilla Firefox
  • Mozilla Firefox ESR
  • Mozilla Thunderbird
Versions: Firefox < 115, Firefox ESR < 102.13, Thunderbird < 102.13
Operating Systems: All platforms (Windows, Linux, macOS, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WebRTC and HTTPS to be enabled (default).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the browser process, potentially leading to full system compromise.

🟠

Likely Case

Browser crash (denial of service) or limited memory corruption leading to information disclosure.

🟢

If Mitigated

No impact if patched versions are used or if WebRTC/HTTPS connections are blocked.

🌐 Internet-Facing: HIGH - Attackers can exploit via malicious websites or emails.
🏢 Internal Only: MEDIUM - Requires user interaction (visiting a malicious site or opening a malicious email).

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires tricking a user into visiting a malicious website or opening a malicious email with WebRTC content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 115, Firefox ESR 102.13, Thunderbird 102.13

Vendor Advisory: https://bugzilla.mozilla.org/show_bug.cgi?id=1826002

Restart Required: Yes

Instructions:

1. Open the browser/email client. 2. Go to Settings/Preferences > General/About. 3. Allow the application to check for and install updates. 4. Restart the application when prompted.

🔧 Temporary Workarounds

Disable WebRTC

all

Prevents the vulnerable component from being used.

In Firefox/Thunderbird: about:config > set media.peerconnection.enabled to false

Block HTTPS connections to untrusted sites

all

Reduces attack surface by limiting WebRTC over HTTPS.

Use browser extensions or network policies to restrict HTTPS access

🧯 If You Can't Patch

  • Restrict user access to untrusted websites and email content.
  • Implement application whitelisting to prevent execution of malicious code.

🔍 How to Verify

Check if Vulnerable:

Check the version in the browser/email client: Firefox/Thunderbird > Help > About.

Check Version:

On Linux: firefox --version | thunderbird --version

Verify Fix Applied:

Confirm the version is Firefox 115+, Firefox ESR 102.13+, or Thunderbird 102.13+.

📡 Detection & Monitoring

Log Indicators:

  • Browser/email client crash logs with memory corruption errors
  • Unexpected WebRTC connection attempts in application logs

Network Indicators:

  • Unusual HTTPS traffic to/from browser on WebRTC ports (e.g., 443, 3478)

SIEM Query:

source="browser_logs" AND (event="crash" OR event="memory_error")

🔗 References

📤 Share & Export