Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape.
The original vulnerability was being exploited in the wild.
*This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1956398 | Permissions Required |
https://issues.chromium.org/issues/405143032 | Permissions Required |
https://www.cve.org/CVERecord?id=CVE-2025-2783 | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2025-19/ | Vendor Advisory |
Configurations
History
01 May 2025, 19:31
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:* |
|
CWE | NVD-CWE-noinfo | |
First Time |
Mozilla
Mozilla firefox |
|
Summary |
|
|
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1956398 - Permissions Required | |
References | () https://issues.chromium.org/issues/405143032 - Permissions Required | |
References | () https://www.cve.org/CVERecord?id=CVE-2025-2783 - Third Party Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2025-19/ - Vendor Advisory |
28 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 10.0 |
27 Mar 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original vulnerability was being exploited in the wild. *This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1. |
27 Mar 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Following the sandbox escape in CVE-2025-2783, various Firefox developers identified a similar pattern in our IPC code. Attackers were able to confuse the parent process into leaking handles to unprivileged child processes leading to a sandbox escape. The original vulnerability was being exploited in the wild. *This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1. |
27 Mar 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-27 14:15
Updated : 2025-05-01 19:31
NVD link : CVE-2025-2857
Mitre link : CVE-2025-2857
CVE.ORG link : CVE-2025-2857
JSON object : View
Products Affected
mozilla
- firefox
CWE