Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Tor Browser Update Patches Exploited Firefox Zero-Day

Tor browser version 13.5.7 is rolling out with patches for an exploited zero-day vulnerability recently addressed in Firefox.

Tor disruption

Shortly after Firefox version 131.0.2 started rolling out last week with patches for an exploited zero-day vulnerability, the Tor browser too was updated with the fix.

Tracked as CVE-2024-9680, the exploited bug is described as a high-severity use-after-free issue in Firefox’s Animation timeline that could lead to the execution of arbitrary code.

“An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines,” Mozilla explained last week.

The non-profit organization said it had received reports of the vulnerability being exploited in the wild, but did not provide further information on the matter.

Cybersecurity firm ESET, which was credited with reporting CVE-2024-9680, has not responded to a SecurityWeek inquiry on the observed attacks. On Friday, however, Mozilla revealed that ESET had sent it the in-the-wild exploit targeting CVE-2024-9680.

“The sample ESET sent us contained a full exploit chain that allowed remote code execution on a user’s computer,” Mozilla said.

The browser maker immediately convened a team to reverse-engineer the exploit and understand how it worked, and was able to create and deliver a patch within a day.

“With no notice and some heavy reverse engineering required, we were able to ship a fix in 25 hours,” Mozilla explained.

Advertisement. Scroll to continue reading.

“While we have resolved the vulnerability in Firefox, our team will continue to analyze the exploit to find additional hardening measures to make deploying exploits for Firefox harder and rarer. It’s also important to keep in mind that these kinds of exploits aren’t unique to Firefox,” Mozilla added.

Patches for CVE-2024-9680, which were included in Firefox version 131.0.2 and Firefox ESR versions 128.3.1 and 115.16.1, are rolling out in Tor browser version 13.5.7.

“Using this vulnerability, an attacker could take control of Tor browser, but probably not deanonymize you in Tails,” Tor’s maintainers explained

In late September, the Tor Project merged with the security-focused OS Tails.

*Update: This article was modified after the Tor Project updated their blog post to remove the incorrect statement that “Mozilla is aware of this attack being used in the wild against Tor Browser users.”

Related: Firefox 131 Update Patches Exploited Zero-Day Vulnerability

Related: 15-Year-Old Python Vulnerability Present in 350,000 Projects Resurrected

Related: WebKit Zero-Day Vulnerability Exploited in Malvertising Operation

Related: vBulletin Patches Zero-Day Exploited in Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Ketan Tailor has joined Barracuda Networks as Chief Customer Officer.

Axonius has appointed former Disney CISO Ryan Knisley as its Chief Product Strategist.

Application security firm Checkmarx has appointed Jonathan Rende as its Chief Product Officer (CPO).

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.