First published: Tue Mar 23 2021(Updated: )
Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <78.9 | 78.9 |
Firefox | <87.0 | |
Firefox ESR | <78.9 | |
Thunderbird | <78.9 | |
Firefox | <87 | 87 |
Firefox ESR | <78.9 | 78.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-23982 is rated as a high-severity vulnerability due to its potential to expose internal network information.
To fix CVE-2021-23982, update your Mozilla Firefox, Firefox ESR, or Thunderbird to the latest available version that is above the specified vulnerable versions.
CVE-2021-23982 affects Mozilla Thunderbird versions up to and including 78.9, Firefox versions up to and including 87, and Firefox ESR versions up to and including 78.9.
CVE-2021-23982 can be exploited by a malicious webpage utilizing WebRTC connections to scan for internal network hosts and local machine services.
CVE-2021-23982 is primarily a client-side vulnerability affecting web browsers and email clients.