Article Details

Original Article Text

Click to Toggle View

Mozilla fixes Firefox zero-day actively exploited in attacks. Mozilla has issued an emergency security update for the Firefox browser to address a critical use-after-free vulnerability that is currently exploited in attacks. The vulnerability, tracked as CVE-2024-9680, and discovered by ESET researcher Damien Schaeffer, is a use-after-free in Animation timelines. This type of flaw occurs when memory that has been freed is still used by the program, allowing malicious actors to add their own malicious data to the memory region to perform code execution. Animation timelines, part of Firefox's Web Animations API, are a mechanism that controls and synchronizes animations on web pages. "An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines," reads the security bulletin. "We have had reports of this vulnerability being exploited in the wild." The vulnerability impacts the latest Firefox (standard release) and the extended support releases (ESR). Fixes have been made available in the below versions, which users are recommended to upgrade to immediately: Given the active exploitation status for CVE-2024-9680 and the lack of any information on how people are targeted, upgrading to the latest versions is essential. To upgrade to the latest version, launch Firefox and go to Settings -> Help -> About Firefox, and the update should start automatically. A restart of the program will be required for the changes to apply. BleepingComputer has contacted both Mozilla and ESET to learn more about the vulnerability, how it's being exploited, and against whom, and we will update this post when we receive more information. Throughout 2024, so far, Mozilla had to fix zero-day vulnerabilities on Firefox only once. On March 22, the internet company released security updates to address CVE-2024-29943 and CVE-2024-29944, both critical-severity issues discovered and demonstrated by Manfred Paul during the Pwn2Own Vancouver 2024 hacking competition.

Daily Brief Summary

CYBERCRIME // Urgent Firefox Update Released to Address Critical Zero-Day Flaw

Mozilla has rolled out an emergency update for its Firefox browser to fix a critical use-after-free vulnerability (CVE-2024-9680) actively exploited by hackers.

The vulnerability was identified by ESET researcher Damien Schaeffer in the browser's Animation timelines, which are vital for managing web animations.

This bug allows attackers to perform code execution by manipulating freed memory spaces within the browser's processes.

Currently, there is limited information regarding the exact targets and the methods used by attackers to exploit this flaw.

Affected versions include the latest Firefox release as well as Firefox Extended Support Releases (ESR).

Users are urged to upgrade immediately to the newest versions of Firefox to mitigate the potential risks associated with this vulnerability.

The update should begin automatically upon checking Firefox’s ‘About’ section under Settings, and a restart is necessary for the changes to take effect.

This is the second instance in 2024 where Mozilla has needed to address zero-day vulnerabilities, following two critical issues patched in March.