Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9680: Use-after-free in Animation timeline in Mozilla Firefox

0
Critical
VulnerabilityCVE-2024-9680cvecve-2024-9680
Published: Wed Oct 09 2024 (10/09/2024, 12:59:07 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 17:19:23 UTC

Technical Analysis

CVE-2024-9680 is a use-after-free vulnerability identified in the Animation timeline subsystem of Mozilla Firefox and Thunderbird. This vulnerability arises when the application improperly manages memory related to animation timelines, leading to a condition where freed memory is accessed again. An attacker can exploit this flaw remotely by crafting malicious web content that triggers the use-after-free condition in the content process, resulting in arbitrary code execution. The vulnerability requires no privileges and no user interaction, making it highly exploitable. Affected versions include Firefox prior to 131.0.2, Firefox ESR versions before 128.3.1 and 115.16.1, and corresponding Thunderbird versions. The CVSS v3.1 score is 9.8, reflecting critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. Although no confirmed exploitation in the wild has been reported, the presence of reports suggests active interest or attempts. The root cause is classified under CWE-416 (Use After Free), a common memory corruption issue that can lead to arbitrary code execution. The vulnerability's exploitation could allow attackers to fully compromise the browser process, potentially leading to system-level compromise depending on sandboxing and OS protections. Mozilla has released patches in versions 131.0.2, 128.3.1, and 115.16.1 for Firefox and corresponding Thunderbird versions to address this issue.

Potential Impact

The impact of CVE-2024-9680 is severe for organizations worldwide. Successful exploitation allows remote attackers to execute arbitrary code within the browser's content process, potentially leading to full compromise of user data, session hijacking, installation of malware, or lateral movement within networks. Since Firefox and Thunderbird are widely used for web browsing and email communication, attackers could leverage this vulnerability to target sensitive information, disrupt operations, or establish persistent footholds. The lack of required privileges and user interaction lowers the barrier for exploitation, increasing risk. Organizations relying on Firefox or Thunderbird for critical communications or accessing sensitive web applications face heightened exposure. Additionally, environments with weak sandboxing or outdated endpoint protections may experience escalated consequences, including system-level compromise. The vulnerability could also be exploited in targeted attacks against high-value individuals or entities, amplifying geopolitical or economic impacts.

Mitigation Recommendations

To mitigate CVE-2024-9680, organizations should immediately update affected Mozilla Firefox and Thunderbird installations to the patched versions (Firefox 131.0.2 or later, Firefox ESR 128.3.1 or later, Thunderbird 131.0.1 or later). Beyond patching, organizations should implement browser hardening measures such as disabling unnecessary plugins and extensions, enabling strict content security policies, and using sandboxing technologies to limit process privileges. Network-level protections like web filtering and intrusion prevention systems can help block malicious payloads exploiting this vulnerability. Employing endpoint detection and response (EDR) solutions can aid in detecting anomalous behaviors indicative of exploitation attempts. User education to avoid suspicious websites remains important, although this vulnerability does not require user interaction. Regular vulnerability scanning and asset inventory to identify outdated browser versions are critical for timely remediation. Finally, organizations should monitor threat intelligence feeds for emerging exploit techniques related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2024-10-09T06:28:21.295Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b8247d717aace26cda

Added to database: 10/21/2025, 7:06:32 PM

Last enriched: 2/27/2026, 5:19:23 PM

Last updated: 3/23/2026, 8:09:57 PM

Views: 162

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses