CVE-2020-12421 — Improper Certificate Validation in Mozilla Firefox
Severity
6.5MEDIUMNVD
OSV7.5
EPSS
1.1%
top 22.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 9
Latest updateMay 24
Description
When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6
Affected Packages9 packages
Also affects: Ubuntu Linux 16.04, 18.04, 19.10, 20.04
🔴Vulnerability Details
5GHSA▶
GHSA-476g-xp34-4rj3: When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an adminis↗2022-05-24
CVEList▶
CVE-2020-12421: When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an adminis↗2020-07-09
OSV▶
CVE-2020-12421: When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an adminis↗2020-07-09
📋Vendor Advisories
8💬Community
1Bugzilla▶
CVE-2020-12421 Mozilla: Add-On updates did not respect the same certificate trust rules as software updates↗2020-07-01