⚠ Actively exploited
Added to CISA KEV on 2022-03-07. Federal agencies required to patch by 2022-03-21. Required action: Apply updates per vendor instructions..
CVE-2022-26485
Severity
8.8HIGH
EPSS
7.2%
top 8.41%
CISA KEV
KEV
Added 2022-03-07
Due 2022-03-21
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
KEV addedMar 7
KEV dueMar 21
PublishedDec 22
CISA Required Action: Apply updates per vendor instructions.
Description
Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages11 packages
🔴Vulnerability Details
5CVEList▶
CVE-2022-26485: Removing an XSLT parameter during processing could have lead to an exploitable use-after-free↗2022-12-22
GHSA▶
GHSA-rj77-m66j-h24w: Removing an XSLT parameter during processing could have lead to an exploitable use-after-free↗2022-12-22
OSV▶
CVE-2022-26485: Removing an XSLT parameter during processing could have lead to an exploitable use-after-free↗2022-12-22
📋Vendor Advisories
5Debian▶
CVE-2022-26485: firefox - Removing an XSLT parameter during processing could have lead to an exploitable u...↗2022