5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
9.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H
0.005 Low
EPSS
Percentile
77.1%
Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 999 | all | firefox | < 69.0-1 | firefox_69.0-1_all.deb |
Debian | 12 | all | firefox-esr | < 68.1.0esr-1 | firefox-esr_68.1.0esr-1_all.deb |
Debian | 11 | all | firefox-esr | < 68.1.0esr-1 | firefox-esr_68.1.0esr-1_all.deb |
Debian | 10 | all | firefox-esr | < 60.9.0esr-1~deb10u1 | firefox-esr_60.9.0esr-1~deb10u1_all.deb |
Debian | 999 | all | firefox-esr | < 68.1.0esr-1 | firefox-esr_68.1.0esr-1_all.deb |
Debian | 13 | all | firefox-esr | < 68.1.0esr-1 | firefox-esr_68.1.0esr-1_all.deb |
5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
9.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H
0.005 Low
EPSS
Percentile
77.1%