CVE-2026-0884

9.8 CRITICAL

📋 TL;DR

A use-after-free vulnerability in the JavaScript Engine component allows attackers to execute arbitrary code or cause denial of service. This affects Firefox, Firefox ESR, Thunderbird, and Thunderbird ESR users running outdated versions. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Firefox
  • Firefox ESR
  • Thunderbird
  • Thunderbird ESR
Versions: Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, Thunderbird < 140.7
Operating Systems: Windows, Linux, macOS, All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. JavaScript must be enabled (default).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full system compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Browser crash leading to denial of service, or limited code execution within sandbox boundaries.

🟢

If Mitigated

No impact if patched; sandboxing may limit damage if exploited.

🌐 Internet-Facing: HIGH - Web browsers process untrusted internet content by design.
🏢 Internal Only: MEDIUM - Internal web applications could be used as attack vectors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Use-after-free vulnerabilities typically require crafted JavaScript to trigger. No public exploit confirmed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 147, Firefox ESR 140.7, Thunderbird 147, Thunderbird ESR 140.7

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2026-01/

Restart Required: Yes

Instructions:

1. Open browser/mail client. 2. Go to Help > About Firefox/Thunderbird. 3. Allow automatic update. 4. Restart when prompted. For enterprise: Deploy updated packages via management tools.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript execution to prevent exploitation.

Firefox: about:config > javascript.enabled = false
Thunderbird: Tools > Options > Advanced > General > Config Editor > javascript.enabled = false

🧯 If You Can't Patch

  • Restrict browser usage to trusted websites only.
  • Implement application whitelisting to block unauthorized browser execution.

🔍 How to Verify

Check if Vulnerable:

Check version in Help > About Firefox/Thunderbird. Compare with affected versions.

Check Version:

Firefox/Thunderbird: Help > About; Linux: firefox --version; Windows: Check in installed programs.

Verify Fix Applied:

Confirm version is Firefox ≥147, Firefox ESR ≥140.7, Thunderbird ≥147, or Thunderbird ESR ≥140.7.

📡 Detection & Monitoring

Log Indicators:

  • Browser crash logs with memory access violations
  • Unexpected process termination of firefox/thunderbird

Network Indicators:

  • Unusual outbound connections from browser process post-crash

SIEM Query:

Process:firefox AND (EventID:1000 OR ExceptionCode:c0000005) OR Process:thunderbird AND (EventID:1000 OR ExceptionCode:c0000005)

🔗 References

📤 Share & Export