Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10463: Cross origin video frame leak in Mozilla Firefox

0
High
VulnerabilityCVE-2024-10463cvecve-2024-10463
Published: Tue Oct 29 2024 (10/29/2024, 12:19:13 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

Video frames could have been leaked between origins in some situations. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:13:44 UTC

Technical Analysis

CVE-2024-10463 is a security vulnerability identified in Mozilla Firefox and Thunderbird products that allows cross-origin leakage of video frame data. The vulnerability arises from improper enforcement of the same-origin policy concerning video frames, which are typically expected to be isolated between different web origins to prevent unauthorized data access. In affected versions of Firefox (prior to 132 and ESR versions prior to 128.4 and 115.17) and Thunderbird (prior to 128.4 and 132), an attacker-controlled web page can exploit this flaw to access video frame content rendered by a different origin, thereby leaking potentially sensitive visual information. The vulnerability is classified under CWE-203 (Information Exposure Through Discrepancy) and has a CVSS v3.1 base score of 7.5, indicating high severity. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality (C:H) without affecting integrity or availability. This means an attacker can remotely and silently extract video frame data without alerting the user or requiring authentication. Although no known exploits are currently reported in the wild, the nature of the vulnerability makes it a significant privacy and confidentiality concern, especially for users accessing sensitive video content through Firefox or Thunderbird. The lack of patch links suggests that fixes may be forthcoming or in progress. Organizations relying on these browsers or email clients should be aware of the risk and prepare to deploy updates promptly once available.

Potential Impact

For European organizations, the primary impact of CVE-2024-10463 is the potential unauthorized disclosure of sensitive video content accessed through Firefox or Thunderbird. This could include confidential video conferences, streamed media, or other proprietary visual data. The breach of confidentiality could lead to exposure of intellectual property, personal data under GDPR, or sensitive communications, resulting in regulatory penalties and reputational damage. Since the vulnerability does not affect integrity or availability, operational disruption is unlikely; however, the silent nature of the exploit increases the risk of unnoticed data leakage. Organizations in sectors such as finance, government, healthcare, and critical infrastructure that rely heavily on secure communications and video conferencing tools are particularly vulnerable. The ease of exploitation without user interaction or privileges means attackers can automate attacks at scale, increasing the threat surface. Additionally, the cross-origin nature of the vulnerability could be leveraged in complex multi-origin web environments common in enterprise settings, amplifying risk.

Mitigation Recommendations

To mitigate CVE-2024-10463, European organizations should: 1) Immediately inventory and identify all Firefox and Thunderbird installations, focusing on versions prior to the fixed releases (Firefox <132, ESR <128.4 and <115.17, Thunderbird <128.4 and <132). 2) Prioritize patch management by applying Mozilla's security updates as soon as they are released. 3) Until patches are available, consider disabling or restricting features that allow cross-origin video frame access, such as disabling certain web APIs or sandboxing browser processes. 4) Employ network monitoring and intrusion detection systems to identify unusual cross-origin video frame requests or data exfiltration attempts. 5) Educate users about the risks of visiting untrusted websites that might exploit this vulnerability. 6) For high-security environments, consider using alternative browsers or email clients not affected by this vulnerability until patches are deployed. 7) Implement Content Security Policy (CSP) headers to restrict cross-origin resource sharing and reduce attack surface. 8) Regularly review browser configurations and extensions that might increase exposure to cross-origin attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2024-10-28T14:23:16.624Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092615fe7723195e0b355f

Added to database: 11/3/2025, 10:00:53 PM

Last enriched: 11/3/2025, 11:13:44 PM

Last updated: 12/20/2025, 5:14:35 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats