Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0880: Vulnerability in Mozilla Firefox

0
High
VulnerabilityCVE-2026-0880cvecve-2026-0880
Published: Tue Jan 13 2026 (01/13/2026, 13:30:54 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

Sandbox escape due to integer overflow in the Graphics component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:23:14 UTC

Technical Analysis

CVE-2026-0880 is a vulnerability identified in the Graphics component of Mozilla Firefox and Thunderbird, caused by an integer overflow (CWE-190). This flaw enables a sandbox escape, allowing an attacker to break out of the browser's restricted execution environment. The vulnerability affects Firefox versions earlier than 147, Firefox ESR versions earlier than 115.32 and 140.7, and Thunderbird versions earlier than 147 and 140.7. The integer overflow occurs when processing certain graphics data, potentially leading to memory corruption and arbitrary code execution. The CVSS v3.1 base score is 8.8, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits are currently known in the wild, the vulnerability's characteristics make it a significant risk, especially since it can be triggered remotely via crafted web content. The sandbox escape capability means that an attacker could execute code outside the browser sandbox, potentially compromising the host system. This elevates the threat from a typical browser vulnerability to a critical endpoint security risk. The vulnerability was published on January 13, 2026, and no patches or exploit code are currently publicly available, but rapid exploitation attempts are likely once patches are released.

Potential Impact

For European organizations, this vulnerability poses a serious risk due to the widespread use of Firefox and Thunderbird in both private and public sectors. Successful exploitation could lead to full system compromise, data breaches, and disruption of critical services. The high impact on confidentiality, integrity, and availability means sensitive information could be exfiltrated, altered, or destroyed. Organizations in sectors such as finance, government, healthcare, and critical infrastructure are particularly vulnerable due to the potential for targeted attacks leveraging this flaw. The requirement for user interaction (e.g., visiting a malicious website or opening a crafted email) increases the risk in environments with less stringent user awareness or filtering controls. Additionally, the sandbox escape nature of the vulnerability could allow attackers to bypass existing endpoint protection mechanisms, increasing the difficulty of detection and remediation. The lack of known exploits currently provides a window for proactive defense, but the high severity score necessitates urgent attention.

Mitigation Recommendations

European organizations should prioritize upgrading affected Firefox and Thunderbird versions to 147 or later, and ESR versions to 115.32 or 140.7 or later as soon as patches become available. Until patches are released, organizations should implement network-level protections such as blocking access to untrusted or suspicious websites, employing web filtering, and using endpoint detection and response (EDR) tools to monitor for anomalous behavior related to graphics processing or sandbox escapes. User education campaigns should emphasize the risks of interacting with unknown links or email attachments. Additionally, deploying application sandboxing or containerization technologies can help limit the impact of potential exploits. Organizations should also review and tighten browser security settings, disable unnecessary plugins or extensions, and consider using browser isolation technologies for high-risk users. Monitoring threat intelligence feeds for emerging exploit code or indicators of compromise related to CVE-2026-0880 is critical for timely response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2026-01-13T13:30:54.411Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69664f10a60475309f2ea2eb

Added to database: 1/13/2026, 1:56:32 PM

Last enriched: 1/21/2026, 2:23:14 AM

Last updated: 2/7/2026, 4:04:48 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats