Lucene search

K
kasperskyKaspersky LabKLA12448
HistoryFeb 08, 2022 - 12:00 a.m.

KLA12448 Multiple vulnerabilities in Mozilla Firefox

2022-02-0800:00:00
Kaspersky Lab
threats.kaspersky.com
50
mozilla firefox" "vulnerabilities" "privilege escalation" "information disclosure" "arbitrary code execution" "security bypass" "cross-site scripting" "spoof user interface

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.003

Percentile

65.6%

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, bypass security restrictions, perform cross-site scripting attack, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Elevation of privilege vulnerability in Maintenance (Updater) Service on Windows can be exploited to gain privileges.
  2. Information disclosure vulnerability in cross-origin responses can be exploited to obtain sensitive information.
  3. Memory safety vulnerability can be exploited to execute arbitrary code.
  4. Remote code execution vulnerability in XSL Transforms can be exploited remotely via special crafted XLS document to execute arbitrary code.
  5. Security bypass vulnerability in extensions can be exploited to bypass security restrictions.
  6. Security bypass vulnerability in Web Extension’s Content Security Policy and frame-ancestors directive can be exploited to bypass security restrictions.
  7. Security bypass vulnerability in Remote Agent if WebDriver is enable can be exploited to bypass security restrictions.
  8. Security bypass vulnerability in tel: link on Android can be exploited to perform cross-site scripting attack.
  9. Code execution vulnerability in Drag&Drop can be exploited via special crafted image to execute arbitrary code.
  10. Security bypass vulnerability in iframe can be exploited via special crafted document to bypass security restrictions.
  11. Security UI vulnerability in JavaScript Dialogs on Android can be exploited to spoof user interface.

Original advisories

MFSA2022-04

Related products

Mozilla-Firefox

CVE list

CVE-2022-22753 high

CVE-2022-22760 high

CVE-2022-22764 critical

CVE-2022-0511 critical

CVE-2022-22755 critical

CVE-2022-22754 high

CVE-2022-22761 critical

CVE-2022-22757 high

CVE-2022-22758 critical

CVE-2022-22756 critical

CVE-2022-22759 critical

CVE-2022-22762 warning

Solution

Update to the latest version

Download Firefox

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • XSS/CSS

Cross site scripting. Exploitation of vulnerabilities with this impact can lead to partial interception of information transmitted between user and site.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Mozilla Firefox earlier than 97

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.003

Percentile

65.6%