First published: Tue May 31 2022(Updated: )
An attacker could have exploited a timing attack by sending a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <91.10 | 91.10 |
Firefox | <101 | |
Firefox ESR | <91.10 | |
Thunderbird | <91.10 | |
Firefox | <101 | 101 |
Firefox ESR | <91.10 | 91.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-31742 has been classified with a severity level that may allow for potential cross-origin account linking exploits.
To remediate CVE-2022-31742, update affected Mozilla products such as Firefox, Firefox ESR, and Thunderbird to fixed versions 101 or 91.10.
CVE-2022-31742 affects Mozilla Firefox versions earlier than 101, Firefox ESR versions earlier than 91.10, and Thunderbird versions earlier than 91.10.
CVE-2022-31742 is associated with timing attacks that could exploit vulnerabilities in handling allowCredential entries.
The exploitation of CVE-2022-31742 could lead to cross-origin account linking, undermining WebAuthn goals.