Article Details
Scrape Timestamp (UTC): 2024-10-10 04:30:01.490
Source: https://thehackernews.com/2024/10/mozilla-warns-of-active-exploitation-in.html
Original Article Text
Click to Toggle View
Mozilla Warns of Active Exploitation in Firefox, Urges Users to Update Immediately. Mozilla has revealed that a critical security flaw impacting Firefox and Firefox Extended Support Release (ESR) has come under active exploitation in the wild. The vulnerability, tracked as CVE-2024-9680, has been described as a use-after-free bug in the Animation timeline component. "An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines," Mozilla said in a Wednesday advisory. "We have had reports of this vulnerability being exploited in the wild." Security researcher Damien Schaeffer from Slovakian company ESET has been credited with discovering and reporting the vulnerability. The issue has been addressed in the following versions of the web browser There are currently no details on how the vulnerability is being exploited and the identity of the threat actor behind them. That said, such remote code execution vulnerabilities could be weaponized in several ways, either as part of a watering hole attack targeting specific websites or by means of a drive-by download campaign that tricks users into visiting bogus websites. Users are advised to update to the latest version to stay protected against active threats.
Daily Brief Summary
Mozilla has disclosed a critical security vulnerability in Firefox and Firefox ESR, actively exploited in the wild.
The flaw, designated CVE-2024-9680, involves a use-after-free error in the Animation timelines, allowing attackers to execute code remotely.
Security expert Damien Schaeffer of ESET identified and reported the vulnerability.
Mozilla urges users to upgrade their browsers immediately to the latest version to mitigate risk.
Details on methods of exploitation and information about the attackers remain undisclosed.
Potential exploitation could involve complex attacks such as drive-by downloads or watering hole strategies targeting specific user groups.
The update fixing the issue is now available, and users are advised to install it without delay to protect against ongoing exploitation threats.