First published: Tue Jun 28 2022(Updated: )
The ms-msdt, search, and search-ms protocols deliver content to Microsoft applications, bypassing the browser, when a user accepts a prompt. These applications have had known vulnerabilities, exploited in the wild (although we know of none exploited through Firefox), so in this release Firefox has blocked these protocols from prompting the user to open them.This bug only affects Firefox on Windows. Other operating systems are unaffected.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <102.0 | |
Firefox ESR | <91.11 | |
Thunderbird | <91.11 | |
Microsoft Windows | ||
Firefox ESR | <91.11 | 91.11 |
Thunderbird | <102 | 102 |
Thunderbird | <91.11 | 91.11 |
Firefox | <102 | 102 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-34478 has been classified as a moderate severity vulnerability due to its potential to allow content exploitation in certain contexts.
To mitigate CVE-2022-34478, users should update their Mozilla Firefox or Thunderbird software to versions 91.11 or 102, respectively.
CVE-2022-34478 affects Mozilla Firefox ESR, Thunderbird, and regular Mozilla Firefox versions prior to 102.0.
As of now, there are no confirmed exploits for CVE-2022-34478 through Firefox, although other applications may be vulnerable.
CVE-2022-34478 involves the ms-msdt, search, and search-ms protocols which can bypass browser security.