CVE-2024-11691

8.8 HIGH

📋 TL;DR

A WebGL vulnerability in Apple silicon M series devices allows out-of-bounds writes and memory corruption through Apple's GPU driver. This affects Firefox and Thunderbird browsers on Apple M series hardware only, potentially enabling arbitrary code execution. Other platforms are unaffected.

💻 Affected Systems

Products:
  • Firefox
  • Firefox ESR
  • Thunderbird
Versions: Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, Thunderbird < 115.18
Operating Systems: macOS on Apple M series silicon
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Apple M series hardware (M1, M2, M3, etc.). Intel Macs, Windows, and Linux systems are unaffected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, or ransomware deployment

🟠

Likely Case

Browser crash or denial of service, with potential for limited code execution in browser context

🟢

If Mitigated

No impact if browsers are updated to patched versions or if non-Apple M hardware is used

🌐 Internet-Facing: HIGH - Web browsers are internet-facing applications that can be exploited via malicious websites
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or compromised internal sites

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires WebGL access which is typically enabled by default. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox ≥ 133, Firefox ESR ≥ 128.5, Firefox ESR ≥ 115.18, Thunderbird ≥ 133, Thunderbird ≥ 128.5, Thunderbird ≥ 115.18

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2024-63/

Restart Required: Yes

Instructions:

1. Open Firefox/Thunderbird
2. Click menu → Help → About Firefox/Thunderbird
3. Allow automatic update to complete
4. Restart browser when prompted

🔧 Temporary Workarounds

Disable WebGL

all

Prevents exploitation by disabling WebGL functionality

In Firefox/Thunderbird address bar, type: about:config
Search for: webgl.disabled
Set value to: true

Use alternative browser

all

Temporarily use a different browser on Apple M devices

🧯 If You Can't Patch

  • Restrict browser usage to non-Apple M hardware
  • Implement network filtering to block malicious WebGL content

🔍 How to Verify

Check if Vulnerable:

Check browser version in Help → About Firefox/Thunderbird and compare with affected versions

Check Version:

firefox --version or thunderbird --version

Verify Fix Applied:

Confirm browser version is at or above patched versions: Firefox ≥ 133, Firefox ESR ≥ 128.5 or ≥ 115.18, Thunderbird ≥ 133, Thunderbird ≥ 128.5 or ≥ 115.18

📡 Detection & Monitoring

Log Indicators:

  • Browser crash logs with WebGL-related errors
  • Unexpected browser process termination

Network Indicators:

  • Requests to known malicious domains hosting WebGL exploits

SIEM Query:

source="browser_logs" AND (event="crash" OR error="WebGL") AND device_hardware="Apple M series"

🔗 References

📤 Share & Export