CVE-2025-0239: Alt-Svc ALPN validation failure when redirected in Mozilla Firefox
When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.
AI Analysis
Technical Summary
CVE-2025-0239 is a vulnerability affecting Mozilla Firefox versions prior to 134 and Thunderbird versions prior to 134 and ESR versions prior to 128.6. The issue arises from improper validation of ALPN certificates during the use of Alt-Svc, a mechanism that allows HTTP/2 or HTTP/3 connections to be redirected to alternative services. Specifically, when the original server redirects to an insecure site, Firefox and Thunderbird fail to properly validate the certificates associated with the ALPN negotiation. This improper validation can be exploited by an attacker positioned to intercept or manipulate network traffic (local attacker) to redirect users to insecure endpoints without triggering certificate validation errors. The vulnerability is classified under CWE-295, which involves improper certificate validation leading to potential man-in-the-middle (MITM) attacks that compromise the integrity of communications. The CVSS v3.1 score is 4.0 (medium severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. No known exploits have been reported in the wild as of the publication date. The vulnerability affects core Mozilla products widely used for web browsing and email, which rely heavily on secure TLS connections and proper certificate validation to maintain trust and security in communications.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of web and email communications conducted via affected versions of Firefox and Thunderbird. An attacker with local network access could exploit this flaw to redirect users to insecure sites or intercept communications, potentially injecting malicious content or altering data in transit. While confidentiality and availability are not directly impacted, the integrity compromise could facilitate further attacks such as phishing, malware delivery, or data manipulation. Organizations in sectors with high security requirements—such as finance, government, healthcare, and critical infrastructure—may face increased risk due to the reliance on secure communications. The vulnerability could undermine trust in secure connections, especially in environments where Alt-Svc is used to optimize network performance or redirect traffic. Given the medium severity and local attack vector, the threat is more relevant in environments where attackers have network proximity, such as public Wi-Fi, corporate networks, or compromised internal segments.
Mitigation Recommendations
1. Update affected Mozilla Firefox and Thunderbird installations to versions 134 or later, or ESR 128.6 or later, as soon as patches become available. 2. Until patches are applied, disable Alt-Svc support in Firefox and Thunderbird via configuration settings (e.g., about:config) to prevent the use of alternative services that trigger the vulnerability. 3. Monitor network traffic for suspicious redirects involving Alt-Svc headers, especially redirects to insecure (non-HTTPS) sites. 4. Employ network segmentation and strong access controls to limit local network attacker capabilities, reducing the risk of man-in-the-middle attacks. 5. Educate users about the risks of using unsecured Wi-Fi networks and encourage the use of VPNs to protect local network traffic. 6. Implement network-level TLS interception detection tools to identify anomalous certificate behavior or unexpected redirects. 7. Coordinate with IT and security teams to audit and update security policies regarding browser and email client configurations to minimize exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Austria
CVE-2025-0239: Alt-Svc ALPN validation failure when redirected in Mozilla Firefox
Description
When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-0239 is a vulnerability affecting Mozilla Firefox versions prior to 134 and Thunderbird versions prior to 134 and ESR versions prior to 128.6. The issue arises from improper validation of ALPN certificates during the use of Alt-Svc, a mechanism that allows HTTP/2 or HTTP/3 connections to be redirected to alternative services. Specifically, when the original server redirects to an insecure site, Firefox and Thunderbird fail to properly validate the certificates associated with the ALPN negotiation. This improper validation can be exploited by an attacker positioned to intercept or manipulate network traffic (local attacker) to redirect users to insecure endpoints without triggering certificate validation errors. The vulnerability is classified under CWE-295, which involves improper certificate validation leading to potential man-in-the-middle (MITM) attacks that compromise the integrity of communications. The CVSS v3.1 score is 4.0 (medium severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. No known exploits have been reported in the wild as of the publication date. The vulnerability affects core Mozilla products widely used for web browsing and email, which rely heavily on secure TLS connections and proper certificate validation to maintain trust and security in communications.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of web and email communications conducted via affected versions of Firefox and Thunderbird. An attacker with local network access could exploit this flaw to redirect users to insecure sites or intercept communications, potentially injecting malicious content or altering data in transit. While confidentiality and availability are not directly impacted, the integrity compromise could facilitate further attacks such as phishing, malware delivery, or data manipulation. Organizations in sectors with high security requirements—such as finance, government, healthcare, and critical infrastructure—may face increased risk due to the reliance on secure communications. The vulnerability could undermine trust in secure connections, especially in environments where Alt-Svc is used to optimize network performance or redirect traffic. Given the medium severity and local attack vector, the threat is more relevant in environments where attackers have network proximity, such as public Wi-Fi, corporate networks, or compromised internal segments.
Mitigation Recommendations
1. Update affected Mozilla Firefox and Thunderbird installations to versions 134 or later, or ESR 128.6 or later, as soon as patches become available. 2. Until patches are applied, disable Alt-Svc support in Firefox and Thunderbird via configuration settings (e.g., about:config) to prevent the use of alternative services that trigger the vulnerability. 3. Monitor network traffic for suspicious redirects involving Alt-Svc headers, especially redirects to insecure (non-HTTPS) sites. 4. Employ network segmentation and strong access controls to limit local network attacker capabilities, reducing the risk of man-in-the-middle attacks. 5. Educate users about the risks of using unsecured Wi-Fi networks and encourage the use of VPNs to protect local network traffic. 6. Implement network-level TLS interception detection tools to identify anomalous certificate behavior or unexpected redirects. 7. Coordinate with IT and security teams to audit and update security policies regarding browser and email client configurations to minimize exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.2
 - Assigner Short Name
 - mozilla
 - Date Reserved
 - 2025-01-06T14:49:04.597Z
 - Cvss Version
 - 3.1
 - State
 - PUBLISHED
 
Threat ID: 6909325c35043901e83099ff
Added to database: 11/3/2025, 10:53:16 PM
Last enriched: 11/3/2025, 11:11:46 PM
Last updated: 11/4/2025, 1:25:52 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-35021: CWE-1188 Insecure Default Initialization of Resource in Abilis CPX
Medium[Research] Unvalidated Trust: Cross-Stage Failure Modes in LLM/agent pipelines arXiv
MediumCVE-2025-0243: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6 in Mozilla Firefox
MediumCVE-2025-0242: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 in Mozilla Firefox
MediumCVE-2025-0241: Memory corruption when using JavaScript Text Segmentation in Mozilla Firefox
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.