The Indian Laptop Emergency Response Staff (CERT-In) has issued a vulnerability be aware (CIVN-2025-0016) highlighting a sequence of Mozilla vulnerability, together with Firefox and Thunderbird.
These vulnerabilities, which have a excessive severity ranking, might have far-reaching implications for customers by probably permitting distant attackers to conduct spoofing assaults, disclose delicate data, execute arbitrary code, or set off denial of service (DoS) situations on affected methods.
Affected Software program Variations
The vulnerabilities in Mozilla merchandise influence quite a lot of software program variations. Customers of the next variations ought to be significantly cautious:
- Mozilla Firefox: Variations previous to 135
- Mozilla Firefox ESR: Variations previous to 115.20 and 128.7
- Mozilla Thunderbird: Variations previous to 135
- Mozilla Thunderbird ESR: Variations previous to 128.7
Given the important nature of those vulnerabilities, all organizations and people utilizing Mozilla Firefox or Thunderbird are urged to replace their software program promptly to mitigate the dangers.
Vulnerabilities in Mozilla Merchandise

The vulnerabilities recognized span a variety of points, together with use-after-free errors, reminiscence security bugs, and issues with certificates validation. These flaws expose methods to a number of assault vectors, placing customers susceptible to unauthorized entry, system crashes, and data breaches.
Key Mozilla Vulnerabilities Recognized
- Use-After-Free in XSLT: Reported as CVE-2025-1009, this flaw within the XSLT part of Mozilla merchandise might trigger a crash when manipulated with specifically crafted XSLT data. This high-impact vulnerability might be exploited to destabilize the system and probably result in code execution.
- Use-After-Free in Customized Spotlight: CVE-2025-1010 pertains to the Customized Spotlight API. If exploited, an attacker might set off a crash, additional compromising system stability and security.
- Reminiscence Security Bugs: A number of situations of reminiscence security bugs had been reported, together with CVE-2025-1016, CVE-2025-1017, and CVE-2025-1020. These vulnerabilities are extremely harmful as they might result in arbitrary code execution, offering attackers with management over the affected methods.
- WebAssembly Code Technology Bug: CVE-2025-1011 factors to a WebAssembly bug that would result in crashes, probably opening the door for code execution assaults. This reasonable influence flaw poses a important risk, particularly for methods working WebAssembly purposes.
- Double-Free Vulnerability in PKCS#7 Decryption: CVE-2024-11704 refers to a double-free vulnerability in PKCS#7 decryption dealing with. Whereas the danger is taken into account decrease, exploitation might lead to reminiscence corruption, additional destabilizing the system.
- Personal Searching Tab Leak: A low-impact challenge, CVE-2025-1013, might trigger non-public browsing tabs to open in regular home windows. Though this vulnerability doesn’t carry important danger by itself, it compromises person privacy and will expose looking historical past.
- E mail Sender Spoofing: A very regarding vulnerability, CVE-2025-0510, allows electronic mail sender spoofing in Thunderbird. This high-impact flaw might enable a malicious actor to control the sender’s handle, making it troublesome for customers to belief the authenticity of incoming emails.
- Fullscreen Notification Points: CVE-2025-1018 and CVE-2025-1019 handle points associated to fullscreen notifications. Exploitation of those vulnerabilities might enable attackers to cover fullscreen notifications, resulting in spoofing attacks.
- Improper Certificates Size Validation: CVE-2025-1014 considerations improper certificates size validation when certificates are added to shops. Whereas the danger is low, this flaw could possibly be leveraged by attackers to execute malicious actions.
Exploiting Mozilla Vulnerabilities
Mozilla vulnerabilities, resembling these recognized in CIVN-2025-0016, might be exploited remotely by attackers via specifically crafted net requests. Customers might unknowingly set off these assaults by visiting malicious web sites or opening malicious email attachments. The influence of those vulnerabilities ranges from system crashes to extreme knowledge breaches and the complete compromise of a system.
Successful exploitation of these flaws could result in an attacker gaining unauthorized access to sensitive information, executing arbitrary code, or causing disruptions through denial of service. As such, the Mozilla vulnerabilities highlighted in CERT-In’s report represent a security risk that should not be underestimated.
Security Fixes and Patches
Mozilla has responded swiftly to these vulnerabilities, releasing a series of security fixes across its product range. On February 4, 2025, Mozilla announced the following updates addressing the reported flaws:
- Firefox 135: Fixed several high-impact vulnerabilities, including the use-after-free flaws in XSLT and Custom Highlight (CVE-2025-1009 and CVE-2025-1010).
- Firefox ESR 115.20 and 128.7: Both releases included patches for critical vulnerabilities, such as memory safety bugs and use-after-free errors.
- Thunderbird 135 and ESR 128.7: Updates were also rolled out for Thunderbird, addressing similar vulnerabilities that affect the email client, together with electronic mail sender spoofing and the WebAssembly bug.
These updates are essential in mitigating the danger related to Mozilla vulnerabilities and ought to be put in by all customers of Mozilla Firefox and Thunderbird as quickly as potential.
Conclusion
The vulnerabilities in Mozilla merchandise highlighted by CERT-In’s vulnerability be aware (CIVN-2025-0016) spotlight the significance of well timed software program updates. With high-impact flaws affecting Mozilla Firefox and Thunderbird, customers are strongly inspired to use the newest patches and keep vigilant for any indicators of exploitation.
The recognized vulnerabilities might enable attackers to entry delicate knowledge, execute malicious code, or trigger disruptions to customers’ methods. As all the time, sustaining up-to-date software program is crucial to guard towards these and different potential safety threats.