CVE-2024-7521
📋 TL;DR
A use-after-free vulnerability in WebAssembly exception handling in Mozilla products could allow remote code execution. This affects Firefox, Firefox ESR, and Thunderbird users running outdated versions. Attackers could exploit this by tricking users into visiting malicious websites.
💻 Affected Systems
- Firefox
- Firefox ESR
- Thunderbird
📦 What is this software?
Firefox by Mozilla
Firefox Esr by Mozilla
Firefox Esr by Mozilla
Thunderbird by Mozilla
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, or ransomware deployment.
Likely Case
Browser crash or arbitrary code execution within browser context, potentially stealing cookies/session data.
If Mitigated
No impact if patched; limited impact if browser sandboxing contains the exploit.
🎯 Exploit Status
Exploitation requires WebAssembly execution and specific exception handling conditions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 129+, Firefox ESR 115.14+, Firefox ESR 128.1+, Thunderbird 128.1+, Thunderbird 115.14+
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2024-33/
Restart Required: Yes
Instructions:
1. Open browser/mail client. 2. Go to Help > About Firefox/Thunderbird. 3. Allow automatic update or download latest version from mozilla.org. 4. Restart application.
🔧 Temporary Workarounds
Disable WebAssembly
allDisable WebAssembly execution in browser to prevent exploitation.
about:config -> javascript.options.wasm = false
Use Content Security Policy
allRestrict WebAssembly execution via CSP headers on web servers.
Content-Security-Policy: script-src 'self'
🧯 If You Can't Patch
- Restrict browser usage to trusted sites only via network policies.
- Implement application whitelisting to prevent unauthorized browser execution.
🔍 How to Verify
Check if Vulnerable:
Check browser version in Help > About. If version is below patched versions, system is vulnerable.
Check Version:
firefox --version or thunderbird --version
Verify Fix Applied:
Confirm version is at or above patched versions after update.
📡 Detection & Monitoring
Log Indicators:
- Browser crash logs with WebAssembly-related exceptions
- Unexpected WebAssembly module loads
Network Indicators:
- Requests to known malicious domains serving WebAssembly content
- Unusual WebAssembly traffic patterns
SIEM Query:
source="browser_logs" AND ("WebAssembly" OR "wasm") AND ("exception" OR "crash")
🔗 References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1904644
- https://www.mozilla.org/security/advisories/mfsa2024-33/
- https://www.mozilla.org/security/advisories/mfsa2024-34/
- https://www.mozilla.org/security/advisories/mfsa2024-35/
- https://www.mozilla.org/security/advisories/mfsa2024-37/
- https://www.mozilla.org/security/advisories/mfsa2024-38/