CVE-2024-3863
📋 TL;DR
This vulnerability allows attackers to download malicious .xrm-ms files without the usual executable file warning in Firefox, Thunderbird, and Firefox ESR on Windows. Attackers could trick users into executing harmful code by disguising it as a legitimate download. Only Windows users of affected browser versions are impacted.
💻 Affected Systems
- Firefox
- Firefox ESR
- Thunderbird
📦 What is this software?
Firefox by Mozilla
Firefox by Mozilla
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, or ransomware deployment.
Likely Case
Malware installation through social engineering where users download and execute disguised malicious files.
If Mitigated
Limited impact if users have updated browsers, use alternative OS, or have endpoint protection blocking suspicious downloads.
🎯 Exploit Status
Exploitation requires user interaction to download and execute the file, but the technical barrier is low once the malicious file is crafted.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 125, Firefox ESR 115.10, Thunderbird 115.10
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2024-18/
Restart Required: Yes
Instructions:
1. Open the browser/application. 2. Go to Settings > Help > About Firefox/Thunderbird. 3. Allow the update to download and install. 4. Restart the application when prompted.
🔧 Temporary Workarounds
Disable automatic downloads for .xrm-ms files
windowsConfigure browser settings to prompt before downloading .xrm-ms files or block them entirely.
Manual configuration in browser settings: Settings > Privacy & Security > Downloads > Always ask you where to save files
Use alternative browser or OS
allSwitch to an unaffected browser (e.g., Chrome, Edge) or use a non-Windows operating system until patched.
🧯 If You Can't Patch
- Implement network filtering to block downloads of .xrm-ms files from untrusted sources.
- Educate users to avoid downloading .xrm-ms files and to verify file sources before execution.
🔍 How to Verify
Check if Vulnerable:
Check browser version in Settings > Help > About Firefox/Thunderbird and compare to affected versions.
Check Version:
In Firefox/Thunderbird, navigate to about:support and check 'Application Version'.
Verify Fix Applied:
Confirm version is Firefox 125+, Firefox ESR 115.10+, or Thunderbird 115.10+ after update.
📡 Detection & Monitoring
Log Indicators:
- Log entries showing downloads of .xrm-ms files from suspicious domains
- Endpoint logs indicating execution of .xrm-ms files
Network Indicators:
- HTTP traffic downloading .xrm-ms files from unknown IPs
- DNS requests for domains hosting .xrm-ms files
SIEM Query:
source="browser_logs" AND file_extension=".xrm-ms" AND user_action="download"
🔗 References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1885855
- https://www.mozilla.org/security/advisories/mfsa2024-18/
- https://www.mozilla.org/security/advisories/mfsa2024-19/
- https://www.mozilla.org/security/advisories/mfsa2024-20/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1885855
- https://www.mozilla.org/security/advisories/mfsa2024-18/
- https://www.mozilla.org/security/advisories/mfsa2024-19/
- https://www.mozilla.org/security/advisories/mfsa2024-20/