Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2800: Vulnerability in Mozilla Firefox

0
Unknown
VulnerabilityCVE-2026-2800cvecve-2026-2800
Published: Tue Feb 24 2026 (02/24/2026, 13:33:29 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

Spoofing issue in the WebAuthn component in Firefox for Android. This vulnerability affects Firefox < 148 and Thunderbird < 148.

AI-Powered Analysis

AILast updated: 02/24/2026, 14:18:47 UTC

Technical Analysis

CVE-2026-2800 identifies a spoofing vulnerability within the WebAuthn component of Mozilla Firefox for Android devices running versions earlier than 148. WebAuthn is a web standard designed to provide strong, phishing-resistant authentication by leveraging public key cryptography and hardware authenticators. The vulnerability allows an attacker to spoof authentication prompts or responses, potentially tricking users or systems into accepting fraudulent authentication events. This undermines the integrity of the authentication process, possibly enabling unauthorized access or session hijacking. The flaw is specific to Firefox on Android, affecting all versions prior to 148, though exact affected versions are unspecified. No CVSS score has been assigned yet, and there are no known exploits in the wild. The vulnerability was reserved and published in February 2026, indicating recent discovery. The absence of patch links suggests that fixes may be forthcoming or integrated into Firefox 148. Given the critical role of WebAuthn in modern secure authentication, this vulnerability represents a significant risk to confidentiality and integrity of user sessions on affected devices.

Potential Impact

The primary impact of CVE-2026-2800 is on the integrity and confidentiality of user authentication processes. Successful exploitation could allow attackers to impersonate legitimate authentication prompts, potentially gaining unauthorized access to user accounts or sensitive systems protected by WebAuthn. This could lead to account takeover, data breaches, and unauthorized transactions. Since WebAuthn is increasingly adopted for high-security environments, including financial services, government portals, and enterprise systems, the vulnerability could have widespread implications. The lack of known exploits reduces immediate risk but does not diminish the potential severity. Organizations relying on Firefox for Android for secure authentication may face increased risk of phishing-like attacks that bypass traditional protections. The availability impact is minimal as the vulnerability does not cause denial of service. However, the breach of authentication integrity can have cascading effects on trust and system security.

Mitigation Recommendations

To mitigate CVE-2026-2800, organizations and users should promptly update Mozilla Firefox on Android devices to version 148 or later once the update is available. Until patches are applied, users should exercise heightened caution when interacting with authentication prompts and verify the legitimacy of WebAuthn requests. Organizations should monitor Mozilla security advisories for patch releases and consider deploying mobile device management (MDM) solutions to enforce timely updates. Additionally, implementing multi-factor authentication methods that do not solely rely on WebAuthn or combining WebAuthn with behavioral analytics can reduce risk. Security teams should educate users about phishing and spoofing risks related to authentication prompts. Network-level protections such as DNS filtering and endpoint security solutions can help detect and block malicious sites attempting to exploit this vulnerability. Finally, reviewing and tightening authentication policies and logs can aid in early detection of suspicious activities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2026-02-19T15:06:52.343Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699daf71be58cf853bdde270

Added to database: 2/24/2026, 2:02:25 PM

Last enriched: 2/24/2026, 2:18:47 PM

Last updated: 2/24/2026, 10:20:01 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats