CVE-2025-8028: Large branch table could lead to truncated instruction in Mozilla Firefox
On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
AI Analysis
Technical Summary
CVE-2025-8028 is a critical vulnerability affecting Mozilla Firefox and Thunderbird on arm64 architectures. The issue arises from the handling of WebAssembly (WASM) 'br_table' instructions that contain a large number of entries. Specifically, when the branch table is excessively large, the label that the instruction branches to may be located too far from the instruction itself. This distance causes the instruction to be truncated, leading to incorrect computation of the branch address. As a result, the program's control flow can be manipulated or corrupted. This vulnerability impacts Firefox versions prior to 141, and various Extended Support Release (ESR) versions prior to 115.26, 128.13, and 140.1, as well as Thunderbird versions prior to 141, 128.13, and 140.1. The vulnerability is classified under CWE-1332, which relates to improper handling of instruction truncation or branch target computation errors. The CVSS v3.1 base score is 9.8, indicating a critical severity level. The vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) shows that the vulnerability is remotely exploitable over the network without any privileges or user interaction, and it can lead to complete compromise of confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the potential for exploitation is high given the ease of triggering the vulnerability via crafted WASM content. The lack of patch links suggests that fixes may be forthcoming or pending deployment. This vulnerability could allow attackers to execute arbitrary code, cause crashes, or bypass security mechanisms by corrupting control flow within the browser or email client, posing a significant risk to users on affected platforms.
Potential Impact
For European organizations, the impact of CVE-2025-8028 is substantial due to the widespread use of Firefox and Thunderbird in both enterprise and public sectors. Successful exploitation could lead to remote code execution, enabling attackers to gain unauthorized access to sensitive data, deploy malware, or disrupt services. This is particularly critical for organizations handling sensitive personal data under GDPR, as breaches could result in regulatory penalties and reputational damage. The vulnerability affects arm64 devices, which are increasingly common in mobile and server environments, expanding the attack surface. Since no user interaction or privileges are required, attackers could exploit this vulnerability through malicious web content or email attachments, making phishing campaigns and drive-by downloads effective attack vectors. The potential for complete compromise of confidentiality, integrity, and availability means that critical infrastructure, government agencies, financial institutions, and healthcare providers in Europe could be targeted, leading to data breaches, operational disruptions, and loss of trust.
Mitigation Recommendations
European organizations should prioritize updating Firefox and Thunderbird to versions 141 or later, or the specified ESR versions that include the fix once available. Until patches are deployed, organizations should consider disabling or restricting WebAssembly execution in Firefox and Thunderbird, especially on arm64 devices, through browser policies or configuration settings. Network-level protections such as web filtering and email scanning should be enhanced to detect and block malicious WASM payloads or suspicious attachments. Employing endpoint detection and response (EDR) solutions that monitor for abnormal process behavior related to Firefox or Thunderbird can help identify exploitation attempts. Additionally, organizations should conduct user awareness training to recognize phishing attempts that might deliver malicious WASM content. For critical environments, consider isolating or sandboxing browsers and email clients to limit the impact of potential exploitation. Monitoring Mozilla security advisories and applying patches promptly upon release is essential to maintain protection against this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Finland
CVE-2025-8028: Large branch table could lead to truncated instruction in Mozilla Firefox
Description
On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-8028 is a critical vulnerability affecting Mozilla Firefox and Thunderbird on arm64 architectures. The issue arises from the handling of WebAssembly (WASM) 'br_table' instructions that contain a large number of entries. Specifically, when the branch table is excessively large, the label that the instruction branches to may be located too far from the instruction itself. This distance causes the instruction to be truncated, leading to incorrect computation of the branch address. As a result, the program's control flow can be manipulated or corrupted. This vulnerability impacts Firefox versions prior to 141, and various Extended Support Release (ESR) versions prior to 115.26, 128.13, and 140.1, as well as Thunderbird versions prior to 141, 128.13, and 140.1. The vulnerability is classified under CWE-1332, which relates to improper handling of instruction truncation or branch target computation errors. The CVSS v3.1 base score is 9.8, indicating a critical severity level. The vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) shows that the vulnerability is remotely exploitable over the network without any privileges or user interaction, and it can lead to complete compromise of confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the potential for exploitation is high given the ease of triggering the vulnerability via crafted WASM content. The lack of patch links suggests that fixes may be forthcoming or pending deployment. This vulnerability could allow attackers to execute arbitrary code, cause crashes, or bypass security mechanisms by corrupting control flow within the browser or email client, posing a significant risk to users on affected platforms.
Potential Impact
For European organizations, the impact of CVE-2025-8028 is substantial due to the widespread use of Firefox and Thunderbird in both enterprise and public sectors. Successful exploitation could lead to remote code execution, enabling attackers to gain unauthorized access to sensitive data, deploy malware, or disrupt services. This is particularly critical for organizations handling sensitive personal data under GDPR, as breaches could result in regulatory penalties and reputational damage. The vulnerability affects arm64 devices, which are increasingly common in mobile and server environments, expanding the attack surface. Since no user interaction or privileges are required, attackers could exploit this vulnerability through malicious web content or email attachments, making phishing campaigns and drive-by downloads effective attack vectors. The potential for complete compromise of confidentiality, integrity, and availability means that critical infrastructure, government agencies, financial institutions, and healthcare providers in Europe could be targeted, leading to data breaches, operational disruptions, and loss of trust.
Mitigation Recommendations
European organizations should prioritize updating Firefox and Thunderbird to versions 141 or later, or the specified ESR versions that include the fix once available. Until patches are deployed, organizations should consider disabling or restricting WebAssembly execution in Firefox and Thunderbird, especially on arm64 devices, through browser policies or configuration settings. Network-level protections such as web filtering and email scanning should be enhanced to detect and block malicious WASM payloads or suspicious attachments. Employing endpoint detection and response (EDR) solutions that monitor for abnormal process behavior related to Firefox or Thunderbird can help identify exploitation attempts. Additionally, organizations should conduct user awareness training to recognize phishing attempts that might deliver malicious WASM content. For critical environments, consider isolating or sandboxing browsers and email clients to limit the impact of potential exploitation. Monitoring Mozilla security advisories and applying patches promptly upon release is essential to maintain protection against this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mozilla
- Date Reserved
- 2025-07-22T10:13:49.236Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 687ffd50a915ff00f7fb595c
Added to database: 7/22/2025, 9:06:24 PM
Last enriched: 7/30/2025, 1:38:27 AM
Last updated: 9/2/2025, 6:53:16 AM
Views: 8
Related Threats
CVE-2025-36193: CWE-732 Incorrect Permission Assignment for Critical Resource in IBM Transformation Advisor
HighCVE-2025-56139: n/a
UnknownCVE-2025-9924: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9923: Cross Site Scripting in Campcodes Sales and Inventory System
MediumCVE-2025-57052: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.