First published: Tue Mar 19 2024(Updated: )
Last updated 24 July 2024
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/firefox | <115.10 | 115.10 |
redhat/thunderbird | <115.10 | 115.10 |
Thunderbird | <115.10 | 115.10 |
Firefox | <124 | 124 |
Firefox ESR | <115.10 | 115.10 |
debian/firefox | 135.0.1-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.7.0esr-1~deb11u1 128.5.0esr-1~deb12u1 128.7.0esr-1~deb12u1 128.7.0esr-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.7.0esr-1~deb11u1 1:128.5.0esr-1~deb12u1 1:128.7.0esr-1~deb12u1 1:128.7.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-2609 has been rated as a high-severity vulnerability due to its potential for clickjacking attacks.
To remediate CVE-2024-2609, update to the latest version of affected software such as Firefox, Firefox ESR, or Thunderbird.
CVE-2024-2609 affects users of Firefox, Firefox ESR, Thunderbird, and their respective packages on various platforms.
CVE-2024-2609 is a clickjacking vulnerability that can be exploited when the permission prompt input delay expires.
Versions of Firefox up to 124, Firefox ESR up to 115.10, and Thunderbird up to 115.10 are vulnerable to CVE-2024-2609.