⚠ Actively exploited
Added to CISA KEV on 2022-03-07. Federal agencies required to patch by 2022-03-21. Required action: Apply updates per vendor instructions..
CVE-2022-26486
Severity
9.6CRITICAL
EPSS
5.5%
top 9.81%
CISA KEV
KEV
Added 2022-03-07
Due 2022-03-21
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
KEV addedMar 7
KEV dueMar 21
PublishedDec 22
CISA Required Action: Apply updates per vendor instructions.
Description
An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:HExploitability: 2.8 | Impact: 6.0
Affected Packages10 packages
🔴Vulnerability Details
5OSV▶
CVE-2022-26486: An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape↗2022-12-22
CVEList▶
CVE-2022-26486: An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape↗2022-12-22
GHSA▶
GHSA-h9vh-vxg7-xmhh: An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape↗2022-12-22
📋Vendor Advisories
5Debian▶
CVE-2022-26486: firefox - An unexpected message in the WebGPU IPC framework could lead to a use-after-free...↗2022