Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Mozilla Patches Firefox Zero-Days Exploited at Pwn2Own

Firefox browser updates address two zero-day vulnerabilities exploited at the Pwn2Own hacking contest.

Pwn2Own Vancouver 2024

Mozilla has released Firefox browser updates to patch two zero-day vulnerabilities that were exploited at the Pwn2Own Vancouver 2024 hacking contest last week.

The issues, discovered by security researcher Manfred Paul, were chained together to escape the browser’s sandbox and execute code on the system.

Tracked as CVE-2024-29943, the first vulnerability is described as an out-of-bounds access flaw that leads to the bypass of range analysis.

“An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination,” Mozilla explains in its advisory.

The second bug, CVE-2024-29944, is a privileged JavaScript execution issue in event handlers, leading to a sandbox escape.

“An attacker was able to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in the parent process,” Mozilla says.

Advertisement. Scroll to continue reading.

CVE-2024-29944, Mozilla notes, affects the desktop version of Firefox only, and cannot be exploited against the mobile app.

Mozilla says both vulnerabilities are ‘critical severity’ bugs, without providing a CVSS score for either of them.

On Friday, Mozilla released Firefox 124.0.1 with patches for both issues and Firefox ESR 115.9.1 with fixes for CVE-2024-29944. Both vulnerabilities were exploited and disclosed at Pwn2Own the day before.

“Manfred Paul used an OOB Write for the RCE and an exposed dangerous function bug to achieve his sandbox escape of Mozilla Firefox,” Trend Micro’s Zero Day Initiative (ZDI) said on Thursday.

Participants at the hacking contest earned over $1.1 million, with Paul declared the winner of this Pwn2Own, after also hacking the Safari, Chrome, and Edge browsers, and earning over $200,000 in bug bounty rewards. He received $100,000 for the two Firefox zero-days.

Related: Chrome 123, Firefox 124 Patch Serious Vulnerabilities

Related: Chrome 122, Firefox 123 Patch High-Severity Vulnerabilities

Related: Firefox 122 Patches 15 Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.

IRONSCALES has named Steve McKenzie as Chief Operating Officer.

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.