Open Nav
Sign Up

CISA: Mozilla Releases Security Updates for Firefox and Thunderbird to Address Critical Vulnerabilities

Bar Refael

February 25, 2024

Mozilla has issued critical security updates for Firefox, Firefox ESR, and Thunderbird to address several vulnerabilities. These vulnerabilities, if exploited, could allow a cyber threat actor to take control of an affected system, leading to potential data theft, system compromise, or further network infiltration.

Details: 

The vulnerabilities addressed in these updates are varied in nature and include issues such as buffer overflows, use-after-free errors, and cross-site scripting (XSS) vulnerabilities. These vulnerabilities are particularly concerning as they could allow remote attackers to execute arbitrary code on the user’s system or manipulate the affected software in unintended ways.

Affected Products:

  • Firefox (versions prior to 110.0)
  • Firefox ESR (versions prior to 102.12)
  • Thunderbird (versions prior to 102.12)

Mitigation: 

Mozilla has released the following security advisories with details on the vulnerabilities and the necessary updates:

  • MFSA 2024-05 for Firefox: This advisory addresses multiple vulnerabilities in Firefox 110.0. Users are advised to update to Firefox 110.0 or later to mitigate these risks.
  • MFSA 2024-06 for Firefox ESR: This advisory covers several vulnerabilities in Firefox ESR 102.12. Users should update to Firefox ESR 102.12 or later to ensure protection.
  • MFSA 2024-07 for Thunderbird: This advisory details vulnerabilities in Thunderbird 102.12. It is recommended to update to Thunderbird 102.12 or later to address these security issues.

CISA Recommendations: 

The Cybersecurity and Infrastructure Security Agency (CISA) strongly encourages users and administrators to review the Mozilla Security Advisories and apply the necessary updates as soon as possible to prevent potential exploitation by cyber threat actors.

Stay safe and informed,

OP Innovate Research Team.

Resources highlights

Critical Zero-Day in CrushFTP Exploited in the Wild (CVE-2025-54309)

A critical zero-day vulnerability in CrushFTP, CVE-2025-54309, is being actively exploited by threat actors to gain unauthenticated administrative access to vulnerable servers via HTTPS. The…

Read more >

CVE-2025-54309

Critical Zero-Day in Microsoft SharePoint Actively Exploited (CVE-2025-53770)

A newly discovered zero-day vulnerability in Microsoft SharePoint Server, tracked as CVE-2025-53770, is currently being exploited in active attacks against on-premises environments. The flaw, rated…

Read more >

CVE-2025-53770

Over 600 Laravel Applications Vulnerable to Remote Code Execution via Leaked APP_KEYs (CVE-2018-15133, CVE-2024-55556)

Security researchers have uncovered a major RCE threat affecting over 600 Laravel applications, triggered by leaked APP_KEYs found on public GitHub repositories. Laravel's APP_KEY, typically…

Read more >

CVE-2018-15133, CVE-2024-55556

CVE-2025-3648: “Count(er) Strike” Vulnerability in ServiceNow

CVE-2025-3648, dubbed “Count(er) Strike”, is a high-severity vulnerability (CVSS 8.2) in ServiceNow's Now Platform, discovered by Varonis Threat Labs. The flaw allows both authenticated and…

Read more >

CVE-2025-3648

What to Look for in a Pentesting Platform (Beyond Just Scans)

Penetration testing platforms are a great way to centralize vulnerability discovery and triage. However, when evaluating penetration testing platforms, many organizations make the mistake of…

Read more >

pentesting platform

CVE-2016-10033: Actively Exploited Remote Code Execution (RCE) Vulnerability in PHPMailer

CVE-2016-10033 is a critical remote code execution vulnerability in PHPMailer, a widely used PHP library for sending emails. The flaw lies in the mailSend function…

Read more >

CVE-2016-10033
Under Cyber Attack?

Fill out the form and we will contact you immediately.