Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11717: Vulnerability in Mozilla Firefox

0
Critical
VulnerabilityCVE-2025-11717cvecve-2025-11717
Published: Tue Oct 14 2025 (10/14/2025, 12:27:37 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

When switching between Android apps using the card carousel Firefox shows a black screen as its card image when a password-related screen was the last one being used. Prior to Firefox 144 the password edit screen was visible. This vulnerability affects Firefox < 144.

AI-Powered Analysis

AILast updated: 10/31/2025, 04:59:57 UTC

Technical Analysis

CVE-2025-11717 is a critical information disclosure vulnerability affecting Mozilla Firefox on Android devices prior to version 144. The issue arises when users switch between Android apps using the card carousel (the app switcher). Previously, if the last active Firefox screen was password-related (e.g., password edit or entry screen), the card carousel would display that sensitive screen image, potentially exposing confidential password information visually. Starting with Firefox 144, this behavior changed to show a black screen instead, preventing sensitive data exposure. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and has a CVSS v3.1 base score of 9.1, reflecting its critical severity. The vector metrics indicate that the vulnerability can be exploited remotely without authentication or user interaction, and it impacts confidentiality and integrity severely, though it does not affect availability. No patches or exploits are currently publicly available, but the flaw represents a significant privacy risk, especially in environments where device screens may be observed or captured by malicious apps or attackers. The vulnerability highlights the importance of proper UI content obfuscation when apps transition to background states on mobile platforms.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive credentials and password management workflows conducted via Firefox on Android devices. Attackers capable of accessing the Android app switcher or capturing screenshots could potentially view sensitive password-related screens that should have been obscured, leading to credential theft or unauthorized access. This risk is heightened in sectors with strict data protection requirements such as finance, healthcare, and government institutions. The integrity of password data could also be compromised if attackers manipulate or intercept password entry processes. Although availability is not impacted, the breach of confidentiality could lead to broader security incidents, including account takeovers and data breaches. Organizations relying on Firefox for mobile access to internal or cloud services should consider this vulnerability a critical threat to their mobile security posture.

Mitigation Recommendations

The primary mitigation is to upgrade Mozilla Firefox on Android devices to version 144 or later, where the vulnerability is resolved by displaying a black screen in the app switcher instead of sensitive password UI content. Until the update is deployed, organizations should implement strict mobile device management (MDM) policies to restrict app switching or screen capture capabilities on devices handling sensitive information. Educate users to avoid multitasking with password screens visible and to lock devices promptly when not in use. Consider deploying additional endpoint security controls that monitor or block unauthorized screen capture or app overlay activities. For highly sensitive environments, evaluate alternative secure browsers or password management solutions that do not expose sensitive UI elements in background states. Regularly audit mobile device configurations and app versions to ensure compliance with security policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2025-10-13T19:50:16.067Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ee47d0509368ccaa6fc99b

Added to database: 10/14/2025, 12:53:36 PM

Last enriched: 10/31/2025, 4:59:57 AM

Last updated: 12/2/2025, 4:12:00 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats