Skip to main content

CVE-2024-0742: Failure to update user input timestamp in Mozilla Firefox

Medium
VulnerabilityCVE-2024-0742cvecve-2024-0742
Published: Tue Jan 23 2024 (01/23/2024, 13:48:15 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.

AI-Powered Analysis

AILast updated: 07/08/2025, 19:42:04 UTC

Technical Analysis

CVE-2024-0742 is a medium-severity vulnerability affecting Mozilla Firefox versions prior to 122, Firefox ESR versions prior to 115.7, and Thunderbird versions prior to 115.7. The issue stems from an incorrect timestamp mechanism used to prevent user input after a page load. Specifically, the browser fails to properly update the timestamp associated with user input events, which can cause certain browser prompts and dialogs to be unintentionally activated or dismissed by the user. This behavior could lead to scenarios where malicious web content might trick users into inadvertently interacting with browser dialogs, potentially bypassing intended user interaction safeguards. The vulnerability does not impact confidentiality or availability directly but affects the integrity of user interactions with browser prompts. The CVSS 3.1 base score is 4.3, reflecting a network attack vector with low complexity, no privileges required, but requiring user interaction. No known exploits are reported in the wild as of the publication date. The flaw resides in the input handling logic of the browser's UI layer, which is critical for maintaining secure user consent and interaction flows.

Potential Impact

For European organizations, this vulnerability could be exploited in targeted phishing or social engineering campaigns where attackers craft web content that manipulates browser dialogs to gain unintended user consent or dismiss security warnings. Although the vulnerability does not allow direct code execution or data exfiltration, the integrity of user decisions can be compromised, potentially leading to further exploitation such as unauthorized permission grants or bypassing security prompts. Organizations relying heavily on Firefox or Thunderbird for email and web access may face increased risk of user-based attacks, especially in sectors with high regulatory compliance requirements like finance, healthcare, and government. The impact is more pronounced in environments where users are less trained to recognize suspicious browser behavior or where automated security controls depend on user confirmations.

Mitigation Recommendations

Organizations should prioritize updating Mozilla Firefox, Firefox ESR, and Thunderbird to versions 122, 115.7, or later respectively, where this vulnerability is patched. Beyond patching, user training should emphasize cautious interaction with browser prompts and dialogs, especially those appearing unexpectedly or on untrusted sites. Deploying browser security extensions that restrict or monitor dialog behavior can add an additional layer of defense. Network-level protections such as web filtering and anti-phishing solutions should be tuned to detect and block suspicious content that attempts to exploit UI interaction flaws. For managed environments, enforcing policies that limit browser extensions and scripts from triggering dialogs without explicit user initiation can reduce attack surface. Continuous monitoring of browser update advisories and rapid deployment of patches is critical to minimize exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2024-01-19T16:52:24.593Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c098182aa0cae2b3b705

Added to database: 5/30/2025, 2:28:40 PM

Last enriched: 7/8/2025, 7:42:04 PM

Last updated: 7/31/2025, 7:23:30 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats