CVE-2025-14321: Vulnerability in Mozilla Firefox
Use-after-free in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
AI Analysis
Technical Summary
CVE-2025-14321 is a use-after-free vulnerability classified under CWE-416 affecting the WebRTC signaling component in Mozilla Firefox and Thunderbird. This memory safety bug could lead to arbitrary code execution if exploited. The vulnerability was addressed and fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6. The CVSS 3.1 base score is 9.8, reflecting critical impact with network attack vector, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. The Mozilla Foundation released security advisories MFSA 2025-92 and MFSA 2025-94 detailing the fix and related memory safety issues. No exploits in the wild are currently known.
Potential Impact
Successful exploitation of this use-after-free vulnerability could allow an attacker to execute arbitrary code remotely without any user interaction or privileges, potentially compromising confidentiality, integrity, and availability of the affected system. The vulnerability affects Firefox and Thunderbird versions prior to the fixed releases. No known active exploitation has been reported.
Mitigation Recommendations
This vulnerability is fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6. Users and administrators should update to these versions or later to remediate the issue. No additional mitigation actions are required beyond applying the official updates provided by Mozilla.
CVE-2025-14321: Vulnerability in Mozilla Firefox
Description
Use-after-free in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14321 is a use-after-free vulnerability classified under CWE-416 affecting the WebRTC signaling component in Mozilla Firefox and Thunderbird. This memory safety bug could lead to arbitrary code execution if exploited. The vulnerability was addressed and fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6. The CVSS 3.1 base score is 9.8, reflecting critical impact with network attack vector, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. The Mozilla Foundation released security advisories MFSA 2025-92 and MFSA 2025-94 detailing the fix and related memory safety issues. No exploits in the wild are currently known.
Potential Impact
Successful exploitation of this use-after-free vulnerability could allow an attacker to execute arbitrary code remotely without any user interaction or privileges, potentially compromising confidentiality, integrity, and availability of the affected system. The vulnerability affects Firefox and Thunderbird versions prior to the fixed releases. No known active exploitation has been reported.
Mitigation Recommendations
This vulnerability is fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6. Users and administrators should update to these versions or later to remediate the issue. No additional mitigation actions are required beyond applying the official updates provided by Mozilla.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mozilla
- Date Reserved
- 2025-12-09T13:37:53.205Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69382833abbdc4595cd48488
Added to database: 12/9/2025, 1:46:27 PM
Last enriched: 4/14/2026, 11:39:16 AM
Last updated: 5/9/2026, 11:54:08 PM
Views: 157
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.