Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2447: Vulnerability in Mozilla Firefox

0
High
VulnerabilityCVE-2026-2447cvecve-2026-2447
Published: Mon Feb 16 2026 (02/16/2026, 14:13:23 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, Firefox ESR < 115.32.1, Thunderbird < 140.7.2, and Thunderbird < 147.0.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 23:40:53 UTC

Technical Analysis

CVE-2026-2447 is a heap buffer overflow vulnerability identified in the libvpx library, which is integrated into Mozilla Firefox and Thunderbird for VP8/VP9 video codec processing. This vulnerability arises from improper bounds checking during video data handling, leading to a heap overflow condition (classified under CWE-122). A successful exploit can allow remote attackers to execute arbitrary code with the privileges of the user running the browser or cause a denial of service by crashing the application. The vulnerability affects Firefox versions earlier than 147.0.4, Firefox ESR versions prior to 140.7.1 and 115.32.1, and Thunderbird versions before 140.7.2 and 147.0.2. Exploitation requires no prior authentication but does require user interaction, such as visiting a malicious website or opening a crafted media file containing malicious VP8/VP9 video streams. The CVSS v3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with its network attack vector and low attack complexity. Although no known exploits have been reported in the wild yet, the vulnerability's nature and severity make it a critical patching priority. Mozilla has reserved the CVE and published the advisory, but patch links are not yet provided, indicating that fixes may be imminent or in progress. The vulnerability's exploitation could lead to full system compromise or persistent malware installation if successful.

Potential Impact

The potential impact of CVE-2026-2447 is significant for organizations and individual users worldwide. Successful exploitation can lead to arbitrary code execution, allowing attackers to take full control of affected systems, steal sensitive information, install persistent malware, or disrupt services by crashing browsers or email clients. This poses a high risk to confidentiality, integrity, and availability of data and systems. Organizations relying on Firefox or Thunderbird for secure communications, especially in sensitive sectors such as government, finance, healthcare, and critical infrastructure, face elevated risks. The vulnerability's network-based attack vector and lack of required privileges mean attackers can target users remotely without prior access. The requirement for user interaction limits mass exploitation but targeted spear-phishing or watering-hole attacks remain feasible. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as proof-of-concept exploits may emerge rapidly after patch release. Failure to patch promptly could lead to widespread compromise, data breaches, and operational disruptions.

Mitigation Recommendations

1. Apply patches immediately once Mozilla releases updates for Firefox (≥147.0.4, ESR ≥140.7.1/115.32.1) and Thunderbird (≥140.7.2, ≥147.0.2) to remediate the vulnerability. 2. Until patches are available, consider disabling or restricting the use of libvpx codec support if feasible, especially in high-risk environments. 3. Employ browser sandboxing and process isolation features to limit the impact of potential exploits. 4. Use runtime exploit mitigation technologies such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and heap protection mechanisms to reduce exploitation success. 5. Educate users to avoid opening suspicious links or media files from untrusted sources to minimize user interaction risks. 6. Monitor network traffic and endpoint logs for unusual activity indicative of exploitation attempts. 7. Maintain up-to-date antivirus and endpoint detection and response (EDR) solutions capable of detecting exploit behaviors related to heap overflows and libvpx anomalies. 8. Consider deploying web content filtering to block or sandbox potentially malicious media content. 9. Review and update incident response plans to address potential exploitation scenarios involving browser-based heap overflows.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2026-02-13T09:28:08.874Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6994257180d747be207b740a

Added to database: 2/17/2026, 8:23:13 AM

Last enriched: 2/24/2026, 11:40:53 PM

Last updated: 4/3/2026, 7:30:20 PM

Views: 783

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses