First published: Tue May 14 2024(Updated: )
An HTTP digest authentication nonce value was generated using `rand()` which could lead to predictable values. This vulnerability affects Firefox < 126.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <126 | 126 |
debian/firefox | 130.0.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-4772 has a moderate severity level due to the potential for predictable nonce values in HTTP digest authentication.
To resolve CVE-2024-4772, upgrade to Mozilla Firefox version 126 or later.
CVE-2024-4772 affects all versions of Firefox prior to 126.
CVE-2024-4772 affects the HTTP digest authentication mechanism in Mozilla Firefox by using a weak nonce value.
Yes, upgrading to Mozilla Firefox version 126 or later is recommended to mitigate CVE-2024-4772.