⚠ Actively exploited
Added to CISA KEV on 2021-11-03. Federal agencies required to patch by 2022-05-03. Required action: Apply updates per vendor instructions..
CVE-2020-6820 — Race Condition in Mozilla Firefox
Severity
8.1HIGHNVD
OSV8.8OSV6.5
EPSS
3.1%
top 13.13%
CISA KEV
KEV
Added 2021-11-03
Due 2022-05-03
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedApr 24
KEV addedNov 3
KEV dueMay 3
Latest updateMay 24
CISA Required Action: Apply updates per vendor instructions.
Description
Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages7 packages
🔴Vulnerability Details
8GHSA▶
GHSA-f77r-rqc9-53hh: Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free↗2022-05-24
OSV▶
CVE-2020-6820: Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free↗2020-04-24
CVEList▶
CVE-2020-6820: Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free↗2020-04-24
📋Vendor Advisories
8🕵️Threat Intelligence
4Tenable▶
CVE-2020-6819, CVE-2020-6820: Critical Mozilla Firefox Zero-Day Vulnerabilities Exploited in the Wild↗2020-04-03
💬Community
3Bugzilla▶
AddressSanitizer: heap-use-after-free /home/fuzzer/firefox/src/dist/include/mozilla/ipc/ProtocolUtils.h:229:31 in Id↗2020-04-01