CVE-2025-5270: SNI was sometimes unencrypted in Mozilla Firefox
In certain cases, SNI could have been sent unencrypted even when encrypted DNS was enabled. This vulnerability affects Firefox < 139 and Thunderbird < 139.
AI Analysis
Technical Summary
CVE-2025-5270 is a high-severity vulnerability affecting Mozilla Firefox and Thunderbird versions prior to 139. The issue involves the Server Name Indication (SNI) extension in the TLS handshake, which is intended to be encrypted when encrypted DNS (such as DNS over HTTPS or DNS over TLS) is enabled. However, due to this vulnerability, in certain cases, the SNI was transmitted unencrypted despite encrypted DNS being active. The SNI reveals the hostname a client is attempting to connect to, which can expose user browsing intentions and potentially sensitive information to network observers. This vulnerability is classified under CWE-319, indicating the transmission of sensitive information in cleartext. The CVSS v3.1 score is 7.5 (high), reflecting that the vulnerability can be exploited remotely without authentication or user interaction, and it results in a complete loss of confidentiality for the hostname information. While the integrity and availability of the connection are not impacted, the exposure of SNI data undermines user privacy and could facilitate targeted surveillance or censorship. No known exploits are reported in the wild yet, and no patches are linked at this time, indicating that mitigation may require updating to Firefox/Thunderbird 139 or later once available. The vulnerability affects all users of the impacted Mozilla products who rely on encrypted DNS to protect their browsing metadata, especially in environments where network traffic is monitored or filtered.
Potential Impact
For European organizations, this vulnerability poses a significant privacy risk. Many enterprises and individuals in Europe use Firefox and Thunderbird as primary browsers and email clients, often with encrypted DNS enabled to comply with privacy regulations such as GDPR. The unencrypted SNI leaks hostname information, potentially exposing browsing patterns, internal domains, or communication endpoints to network adversaries, including malicious actors or state-level surveillance. This could lead to targeted attacks, industrial espionage, or violation of privacy laws. Organizations handling sensitive data, such as financial institutions, healthcare providers, and government agencies, are particularly at risk. Moreover, the exposure could undermine trust in encrypted DNS solutions, which are increasingly adopted in Europe to enhance privacy. Although the vulnerability does not allow direct code execution or service disruption, the confidentiality breach can have cascading effects on organizational security posture and compliance.
Mitigation Recommendations
European organizations should prioritize updating Mozilla Firefox and Thunderbird to version 139 or later as soon as patches become available. Until then, they should consider disabling encrypted DNS in these applications if the risk of SNI exposure outweighs the benefits, or use alternative browsers and email clients with verified SNI encryption. Network administrators can deploy TLS 1.3 with Encrypted Client Hello (ECH) support where possible, which encrypts SNI more robustly. Monitoring network traffic for unencrypted SNI leaks can help detect exploitation attempts. Additionally, organizations should educate users about this vulnerability and encourage cautious browsing behavior on untrusted networks. Implementing network-level protections such as VPNs or secure proxies can further reduce exposure. Finally, maintaining up-to-date threat intelligence feeds and vendor advisories will ensure timely response to any emerging exploits.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain, Poland, Finland
CVE-2025-5270: SNI was sometimes unencrypted in Mozilla Firefox
Description
In certain cases, SNI could have been sent unencrypted even when encrypted DNS was enabled. This vulnerability affects Firefox < 139 and Thunderbird < 139.
AI-Powered Analysis
Technical Analysis
CVE-2025-5270 is a high-severity vulnerability affecting Mozilla Firefox and Thunderbird versions prior to 139. The issue involves the Server Name Indication (SNI) extension in the TLS handshake, which is intended to be encrypted when encrypted DNS (such as DNS over HTTPS or DNS over TLS) is enabled. However, due to this vulnerability, in certain cases, the SNI was transmitted unencrypted despite encrypted DNS being active. The SNI reveals the hostname a client is attempting to connect to, which can expose user browsing intentions and potentially sensitive information to network observers. This vulnerability is classified under CWE-319, indicating the transmission of sensitive information in cleartext. The CVSS v3.1 score is 7.5 (high), reflecting that the vulnerability can be exploited remotely without authentication or user interaction, and it results in a complete loss of confidentiality for the hostname information. While the integrity and availability of the connection are not impacted, the exposure of SNI data undermines user privacy and could facilitate targeted surveillance or censorship. No known exploits are reported in the wild yet, and no patches are linked at this time, indicating that mitigation may require updating to Firefox/Thunderbird 139 or later once available. The vulnerability affects all users of the impacted Mozilla products who rely on encrypted DNS to protect their browsing metadata, especially in environments where network traffic is monitored or filtered.
Potential Impact
For European organizations, this vulnerability poses a significant privacy risk. Many enterprises and individuals in Europe use Firefox and Thunderbird as primary browsers and email clients, often with encrypted DNS enabled to comply with privacy regulations such as GDPR. The unencrypted SNI leaks hostname information, potentially exposing browsing patterns, internal domains, or communication endpoints to network adversaries, including malicious actors or state-level surveillance. This could lead to targeted attacks, industrial espionage, or violation of privacy laws. Organizations handling sensitive data, such as financial institutions, healthcare providers, and government agencies, are particularly at risk. Moreover, the exposure could undermine trust in encrypted DNS solutions, which are increasingly adopted in Europe to enhance privacy. Although the vulnerability does not allow direct code execution or service disruption, the confidentiality breach can have cascading effects on organizational security posture and compliance.
Mitigation Recommendations
European organizations should prioritize updating Mozilla Firefox and Thunderbird to version 139 or later as soon as patches become available. Until then, they should consider disabling encrypted DNS in these applications if the risk of SNI exposure outweighs the benefits, or use alternative browsers and email clients with verified SNI encryption. Network administrators can deploy TLS 1.3 with Encrypted Client Hello (ECH) support where possible, which encrypts SNI more robustly. Monitoring network traffic for unencrypted SNI leaks can help detect exploitation attempts. Additionally, organizations should educate users about this vulnerability and encourage cautious browsing behavior on untrusted networks. Implementing network-level protections such as VPNs or secure proxies can further reduce exposure. Finally, maintaining up-to-date threat intelligence feeds and vendor advisories will ensure timely response to any emerging exploits.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mozilla
- Date Reserved
- 2025-05-27T12:29:28.241Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6835b383182aa0cae2110aff
Added to database: 5/27/2025, 12:43:47 PM
Last enriched: 9/24/2025, 12:26:39 AM
Last updated: 9/27/2025, 12:10:07 AM
Views: 28
Related Threats
CVE-2025-59939: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
HighCVE-2025-59936: CWE-116: Improper Encoding or Escaping of Output in nearform get-jwks
CriticalCVE-2025-36144: CWE-532 Insertion of Sensitive Information into Log File in IBM watsonx.data
LowCVE-2025-1862: CWE-434 Unrestricted Upload of File with Dangerous Type in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-60154: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Jennifer Moss MWW Disclaimer Buttons
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.