⚠ Actively exploited
Added to CISA KEV on 2022-03-07. Federal agencies required to patch by 2022-03-21. Required action: Apply updates per vendor instructions..

CVE-2022-26485

CWE-416Use After Free11 documents10 sources
Severity
8.8HIGH
EPSS
7.2%
top 8.41%
CISA KEV
KEV
Added 2022-03-07
Due 2022-03-21
Exploit
Exploited in wild
Active exploitation observed
Timeline
KEV addedMar 7
KEV dueMar 21
PublishedDec 22
CISA Required Action: Apply updates per vendor instructions.

Description

Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages11 packages

NVDmozilla/firefox_focus< 97.3.0
CVEListV5mozilla/firefox_for_androidunspecified97.3.0
CVEListV5mozilla/firefoxunspecified97.0.2
NVDmozilla/firefox< 91.6.1+2
CVEListV5mozilla/firefox_esrunspecified91.6.1

🔴Vulnerability Details

5
CVEList
CVE-2022-26485: Removing an XSLT parameter during processing could have lead to an exploitable use-after-free2022-12-22
GHSA
GHSA-rj77-m66j-h24w: Removing an XSLT parameter during processing could have lead to an exploitable use-after-free2022-12-22
OSV
CVE-2022-26485: Removing an XSLT parameter during processing could have lead to an exploitable use-after-free2022-12-22
OSV
firefox vulnerabilities2022-03-06
VulnCheck
Mozilla Firefox Use-After-Free Vulnerability2022

📋Vendor Advisories

5
CISA
Mozilla Firefox Use-After-Free Vulnerability2022-03-07
Ubuntu
Firefox vulnerabilities2022-03-06
Red Hat
Mozilla: Use-after-free in XSLT parameter processing2022-03-05
Debian
CVE-2022-26485: firefox - Removing an XSLT parameter during processing could have lead to an exploitable u...2022
Mozilla
Mozilla Foundation Security Advisory 2022-09: CVE-2022-26485
CVE-2022-26485 (HIGH CVSS 8.8) | Removing an XSLT parameter during p | cvebase.io