First published: Tue Feb 20 2024(Updated: )
A website could have obscured the fullscreen notification by using a dropdown select input element. This could have led to user confusion and possible spoofing attacks.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/firefox | <115.8 | 115.8 |
redhat/thunderbird | <115.8 | 115.8 |
Thunderbird | <115.8 | 115.8 |
Firefox | <123 | 123 |
Firefox ESR | <115.8 | 115.8 |
Firefox | <115.8.0 | |
Firefox | <123.0 | |
Thunderbird | <115.8.0 | |
Debian Linux | =10.0 | |
debian/firefox | 137.0.1-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.9.0esr-1~deb11u1 128.8.0esr-1~deb12u1 128.9.0esr-1~deb12u1 128.9.0esr-2 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.9.0esr-1~deb11u1 1:128.8.0esr-1~deb12u1 1:128.9.0esr-1~deb12u1 1:128.9.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-1548 has a moderate severity rating due to its potential to mislead users and facilitate spoofing attacks.
To fix CVE-2024-1548, users should update their Mozilla Firefox, Thunderbird, or Firefox ESR to versions that address this vulnerability.
CVE-2024-1548 affects users of Mozilla Firefox, Thunderbird, and Firefox ESR versions prior to specified safe updates.
CVE-2024-1548 could lead to user confusion and allow for spoofing attacks by obscuring fullscreen notifications.
Users should update to Firefox versions 123 and above, Thunderbird versions 115.8 and above, or Firefox ESR to mitigate CVE-2024-1548.