Skip to main content

CVE-2024-0743: Crash in NSS TLS method in Mozilla Firefox

High
VulnerabilityCVE-2024-0743cvecve-2024-0743
Published: Tue Jan 23 2024 (01/23/2024, 13:48:20 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

An unchecked return value in TLS handshake code could have caused a potentially exploitable crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.9, and Thunderbird < 115.9.

AI-Powered Analysis

AILast updated: 07/08/2025, 19:42:18 UTC

Technical Analysis

CVE-2024-0743 is a high-severity vulnerability identified in the Network Security Services (NSS) TLS implementation used by Mozilla Firefox and Thunderbird. The flaw arises from an unchecked return value during the TLS handshake process, which can lead to a crash of the affected application. Specifically, this vulnerability affects Firefox versions prior to 122, Firefox ESR versions prior to 115.9, and Thunderbird versions prior to 115.9. The unchecked return value corresponds to CWE-252, indicating a failure to handle error conditions properly. Exploiting this vulnerability requires no user interaction, no privileges, and can be triggered remotely over the network during the TLS handshake, making it a network-exploitable denial-of-service (DoS) vector. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation (network attack vector, low attack complexity, no privileges or user interaction required) and the impact on availability (application crash). However, confidentiality and integrity are not impacted. There are no known exploits in the wild at the time of publication, and no patch links were provided in the source data, but it is expected that Mozilla will release or has released updates to address this issue. The vulnerability could be triggered by a malicious TLS server or a man-in-the-middle attacker during the TLS handshake, causing Firefox or Thunderbird clients to crash, resulting in denial of service for the user.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily in terms of availability disruption. Firefox and Thunderbird are widely used across Europe in both enterprise and consumer environments for web browsing and email communication, respectively. An attacker could exploit this vulnerability to cause repeated crashes of these applications, leading to denial of service conditions. This could disrupt business operations, especially in organizations relying heavily on Firefox for accessing web-based applications or Thunderbird for email communications. While the vulnerability does not compromise confidentiality or integrity, the denial of service could be leveraged as part of a broader attack campaign to degrade organizational productivity or as a distraction while other attacks are carried out. Additionally, sectors with high reliance on secure communications, such as finance, government, and critical infrastructure, could be more impacted if their users experience frequent application crashes. The lack of required user interaction and the remote exploitability increase the risk of widespread impact if exploited at scale.

Mitigation Recommendations

European organizations should prioritize updating Firefox and Thunderbird to versions 122 and 115.9 or later, respectively, as soon as patches become available from Mozilla. Until updates are applied, organizations can implement network-level mitigations such as blocking or monitoring suspicious TLS handshake traffic, especially from untrusted or unknown sources. Deploying intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous TLS handshake behavior could help identify exploitation attempts. Organizations should also educate users to report frequent crashes of Firefox or Thunderbird, which could indicate exploitation attempts. For critical environments, consider temporarily restricting access to untrusted TLS servers or proxies that could trigger the vulnerability. Maintaining robust endpoint detection and response (EDR) capabilities can help detect exploitation attempts and respond promptly. Finally, organizations should monitor Mozilla security advisories for official patches and guidance and apply them promptly to eliminate the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2024-01-19T16:52:24.775Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c098182aa0cae2b3b707

Added to database: 5/30/2025, 2:28:40 PM

Last enriched: 7/8/2025, 7:42:18 PM

Last updated: 8/16/2025, 6:38:43 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats