Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2792: Vulnerability in Mozilla Firefox

0
Critical
VulnerabilityCVE-2026-2792cvecve-2026-2792
Published: Tue Feb 24 2026 (02/24/2026, 13:33:22 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 20:36:34 UTC

Technical Analysis

CVE-2026-2792 is a critical memory safety vulnerability identified in Mozilla Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147, and Thunderbird 147. The issue stems from memory corruption bugs that can lead to arbitrary code execution. These bugs fall under CWE-787 (Out-of-bounds Write), indicating that the software writes data outside the bounds of allocated memory, which can corrupt memory and enable attackers to manipulate program execution flow. The vulnerability affects all Firefox versions prior to 148 and Thunderbird versions prior to 148, including ESR versions before 140.8. The CVSS v3.1 base score of 9.8 reflects that the vulnerability can be exploited remotely (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). While no public exploits have been reported yet, the presence of memory corruption and the critical CVSS score suggest that exploitation is feasible with sufficient effort. Mozilla has published the vulnerability but has not yet released patches at the time of this report. The vulnerability poses a significant risk to users of Firefox and Thunderbird, especially in environments where these applications are used for sensitive communications or browsing. The technical root cause involves improper memory handling leading to out-of-bounds writes, which attackers can leverage to execute arbitrary code remotely, potentially taking full control of affected systems.

Potential Impact

The impact of CVE-2026-2792 is severe for organizations worldwide using affected versions of Mozilla Firefox and Thunderbird. Successful exploitation could allow attackers to execute arbitrary code remotely without any user interaction or privileges, leading to full system compromise. This threatens the confidentiality of sensitive data, the integrity of system operations, and the availability of services. Organizations relying on Firefox or Thunderbird for secure communications, web browsing, or email management face risks of data breaches, espionage, malware deployment, and disruption of business operations. The vulnerability's ease of exploitation and critical severity make it attractive for threat actors, including nation-state adversaries and cybercriminals. The widespread adoption of Firefox and Thunderbird across government, enterprise, and consumer sectors amplifies the potential scale of impact. Additionally, the lack of current known exploits does not diminish the urgency, as proof-of-concept exploits could emerge rapidly. Failure to address this vulnerability promptly could result in significant operational and reputational damage.

Mitigation Recommendations

1. Immediate upgrade to Mozilla Firefox version 148 or later and Thunderbird version 148 or later once patches are released. 2. For environments using ESR versions, upgrade to Firefox ESR 140.8 or Thunderbird ESR 140.8 or later. 3. Until patches are available, consider restricting network access to Firefox and Thunderbird clients to limit exposure, especially from untrusted networks. 4. Employ application whitelisting and endpoint protection solutions capable of detecting anomalous memory corruption behaviors. 5. Enable and enforce sandboxing features and memory protection mechanisms such as Control Flow Guard (CFG) and Address Space Layout Randomization (ASLR) on client systems. 6. Monitor security advisories from Mozilla for updates and apply patches immediately upon release. 7. Conduct user awareness training to minimize risk from potential phishing or malicious web content that could trigger exploitation. 8. Implement network-level intrusion detection systems tuned to detect exploitation attempts targeting Firefox or Thunderbird memory corruption vulnerabilities. 9. Maintain regular backups and incident response plans to mitigate potential damage from successful exploitation. These measures go beyond generic advice by focusing on interim risk reduction and leveraging system-level protections until patches are deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2026-02-19T15:06:37.841Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699daf70be58cf853bdde234

Added to database: 2/24/2026, 2:02:24 PM

Last enriched: 3/3/2026, 8:36:34 PM

Last updated: 4/11/2026, 2:17:10 AM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses