Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0743: Crash in NSS TLS method in Mozilla Firefox

0
High
VulnerabilityCVE-2024-0743cvecve-2024-0743
Published: Tue Jan 23 2024 (01/23/2024, 13:48:20 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

An unchecked return value in TLS handshake code could have caused a potentially exploitable crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.9, and Thunderbird < 115.9.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:11:55 UTC

Technical Analysis

CVE-2024-0743 is a vulnerability identified in the TLS handshake implementation within the NSS library used by Mozilla Firefox and Thunderbird. Specifically, the flaw arises from an unchecked return value during the TLS handshake process, which can lead to a crash of the application. This unchecked return value corresponds to CWE-252 (Unchecked Return Value), indicating a failure to properly handle error conditions. The vulnerability affects Firefox versions prior to 122, Firefox ESR versions prior to 115.9, and Thunderbird versions prior to 115.9. The TLS handshake is a critical phase in establishing secure communications, and a failure here can disrupt the establishment of secure connections. The crash can be triggered remotely by an attacker who sends crafted TLS handshake messages, requiring no user interaction or authentication, making exploitation feasible over the network. Although the vulnerability does not directly lead to confidentiality or integrity breaches, the resulting denial of service can disrupt user access to web resources or email services. Mozilla has published the vulnerability with a CVSS 3.1 score of 7.5, categorizing it as high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed. No public exploits have been reported yet, but the potential for denial of service attacks exists. The vulnerability underscores the importance of robust error handling in security-critical libraries like NSS. Organizations using affected versions should prioritize updating to the fixed versions to prevent potential service disruptions.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of critical communication tools such as Firefox and Thunderbird, which are widely used for web browsing and email. A successful exploitation could lead to denial of service conditions, disrupting business operations, communications, and access to web-based services. Sectors such as finance, government, healthcare, and critical infrastructure that rely on secure and reliable communications could face operational interruptions. While confidentiality and integrity are not directly compromised, the availability impact can indirectly affect business continuity and incident response capabilities. Additionally, denial of service attacks exploiting this vulnerability could be used as part of larger multi-vector attacks or to create distractions for other malicious activities. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the risk profile. Organizations with remote workforces relying on Firefox and Thunderbird are particularly vulnerable to disruptions. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, emphasizing the need for proactive patch management.

Mitigation Recommendations

European organizations should immediately verify the versions of Mozilla Firefox and Thunderbird deployed across their environments and prioritize upgrading to Firefox 122 or later, and Thunderbird 115.9 or later, where the vulnerability is patched. Network-level protections such as intrusion detection/prevention systems (IDS/IPS) should be tuned to detect anomalous TLS handshake patterns that could indicate exploitation attempts. Organizations should also consider implementing application-layer firewalls or TLS inspection proxies to monitor and block suspicious TLS traffic. Regular vulnerability scanning and asset inventory management will help identify unpatched systems. For environments where immediate patching is not feasible, temporary mitigations include restricting access to Firefox and Thunderbird from untrusted networks or using endpoint protection solutions to monitor for crashes and unusual application behavior. Security teams should monitor Mozilla security advisories and threat intelligence feeds for updates on exploit developments. User awareness campaigns should emphasize the importance of applying software updates promptly. Finally, organizations should test patches in controlled environments to ensure compatibility and stability before wide deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2024-01-19T16:52:24.775Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c098182aa0cae2b3b707

Added to database: 5/30/2025, 2:28:40 PM

Last enriched: 11/3/2025, 11:11:55 PM

Last updated: 12/3/2025, 3:14:19 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats