CVE-2024-1546

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to read memory outside the intended buffer boundaries when Firefox, Firefox ESR, or Thunderbird processes network data. It affects all users running vulnerable versions of these applications. Successful exploitation could leak sensitive information from browser memory.

💻 Affected Systems

Products:
  • Firefox
  • Firefox ESR
  • Thunderbird
Versions: Firefox < 123, Firefox ESR < 115.8, Thunderbird < 115.8
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure leading to exposure of sensitive data like passwords, session tokens, or other memory contents to attackers.

🟠

Likely Case

Memory content leakage that could be combined with other vulnerabilities for more severe attacks, or direct exposure of user data.

🟢

If Mitigated

Limited impact with proper network segmentation and updated software, though information disclosure risk remains if exploited.

🌐 Internet-Facing: HIGH - These applications directly process untrusted internet content and network data.
🏢 Internal Only: MEDIUM - Internal use still involves processing potentially malicious content from emails or internal web applications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires tricking users into visiting malicious websites or opening malicious emails. No authentication required for the memory read.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 123+, Firefox ESR 115.8+, Thunderbird 115.8+

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2024-05/

Restart Required: Yes

Instructions:

1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Allow automatic update download and installation. 4. Restart the application when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Prevents many web-based exploitation vectors but severely limits functionality

about:config → javascript.enabled = false

Network Segmentation

all

Restrict browser access to sensitive internal networks

🧯 If You Can't Patch

  • Isolate affected systems from sensitive networks and data
  • Implement application whitelisting to prevent execution of malicious content

🔍 How to Verify

Check if Vulnerable:

Check application version in Help → About Firefox/Thunderbird

Check Version:

firefox --version or thunderbird --version

Verify Fix Applied:

Confirm version is Firefox ≥123, Firefox ESR ≥115.8, or Thunderbird ≥115.8

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unusual outbound data transfers from browser processes

Network Indicators:

  • Suspicious connections to known malicious domains combined with browser crashes

SIEM Query:

source="*firefox*" OR source="*thunderbird*" AND (event_type="crash" OR memory_access_violation)

🔗 References

📤 Share & Export