First published: Tue Sep 03 2019(Updated: )
A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <68.1 | 68.1 |
Mozilla Firefox | <69.0 | |
Mozilla Firefox ESR | <68.1.0 | |
Mozilla Firefox | <69 | 69 |
debian/firefox | 132.0.2-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.4.0esr-1~deb11u1 128.3.1esr-1~deb12u1 128.4.0esr-1~deb12u1 128.3.1esr-2 128.4.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this WebRTC vulnerability is CVE-2019-11749.
The vulnerability allows malicious web content to use probing techniques on the getUserMedia API to reveal device properties of cameras without triggering a user prompt or notification, potentially allowing fingerprinting of users.
The Mozilla Firefox ESR versions up to 68.1 and Mozilla Firefox versions up to 69 are affected by this vulnerability.
The severity level of CVE-2019-11749 vulnerability is Medium (ranked 4 out of 10).
To fix the CVE-2019-11749 vulnerability, update your Mozilla Firefox ESR to version 68.1 or later, or update your Mozilla Firefox to version 69 or later.