CVE-2026-6772: Vulnerability in Mozilla Firefox
CVE-2026-6772 is a vulnerability involving incorrect boundary conditions in the Libraries component of the Network Security Services (NSS) used by Mozilla Firefox. This issue was addressed and fixed in Firefox 150, Firefox ESR 115. 35, and Firefox ESR 140. 10. The vulnerability is categorized with moderate impact by Mozilla. It is part of a broader set of security fixes released by Mozilla in April 2026. No known exploits in the wild have been reported for this specific vulnerability.
AI Analysis
Technical Summary
The vulnerability CVE-2026-6772 concerns incorrect boundary conditions within the Libraries component of NSS, a security library used by Mozilla Firefox. Incorrect boundary conditions can lead to potential memory safety issues or logic errors. Mozilla fixed this vulnerability in Firefox 150 and the corresponding ESR versions 115.35 and 140.10. The vendor advisory classifies the impact as moderate and includes this fix among multiple security updates addressing various memory safety and other issues. No CVSS score is provided for this vulnerability, but it is grouped with other moderate-impact bugs in the NSS libraries.
Potential Impact
The impact is considered moderate by Mozilla. Incorrect boundary conditions in NSS could potentially lead to memory safety issues or other unintended behavior affecting the security of Firefox. However, there are no reports of active exploitation in the wild. The fix is included in Firefox 150 and ESR versions 115.35 and 140.10, mitigating the risk for users who have applied these updates.
Mitigation Recommendations
Mozilla has released official fixes for this vulnerability in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10. Users and administrators should update to these versions or later to remediate the vulnerability. Since this is not a cloud service, remediation depends on applying these updates. Patch status is confirmed by the vendor advisories linked in the input data.
CVE-2026-6772: Vulnerability in Mozilla Firefox
Description
CVE-2026-6772 is a vulnerability involving incorrect boundary conditions in the Libraries component of the Network Security Services (NSS) used by Mozilla Firefox. This issue was addressed and fixed in Firefox 150, Firefox ESR 115. 35, and Firefox ESR 140. 10. The vulnerability is categorized with moderate impact by Mozilla. It is part of a broader set of security fixes released by Mozilla in April 2026. No known exploits in the wild have been reported for this specific vulnerability.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability CVE-2026-6772 concerns incorrect boundary conditions within the Libraries component of NSS, a security library used by Mozilla Firefox. Incorrect boundary conditions can lead to potential memory safety issues or logic errors. Mozilla fixed this vulnerability in Firefox 150 and the corresponding ESR versions 115.35 and 140.10. The vendor advisory classifies the impact as moderate and includes this fix among multiple security updates addressing various memory safety and other issues. No CVSS score is provided for this vulnerability, but it is grouped with other moderate-impact bugs in the NSS libraries.
Potential Impact
The impact is considered moderate by Mozilla. Incorrect boundary conditions in NSS could potentially lead to memory safety issues or other unintended behavior affecting the security of Firefox. However, there are no reports of active exploitation in the wild. The fix is included in Firefox 150 and ESR versions 115.35 and 140.10, mitigating the risk for users who have applied these updates.
Mitigation Recommendations
Mozilla has released official fixes for this vulnerability in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10. Users and administrators should update to these versions or later to remediate the vulnerability. Since this is not a cloud service, remediation depends on applying these updates. Patch status is confirmed by the vendor advisories linked in the input data.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mozilla
- Date Reserved
- 2026-04-21T12:41:04.255Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
- Vendor Advisory Urls
- [{"url":"https://www.mozilla.org/security/advisories/mfsa2026-30/","vendor":"Mozilla"},{"url":"https://www.mozilla.org/security/advisories/mfsa2026-31/","vendor":"Mozilla"},{"url":"https://www.mozilla.org/security/advisories/mfsa2026-32/","vendor":"Mozilla"}]
Threat ID: 69e7789e19fe3cd2cdd164c0
Added to database: 4/21/2026, 1:16:14 PM
Last enriched: 4/21/2026, 1:32:36 PM
Last updated: 4/21/2026, 3:44:12 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.