First published: Wed Sep 05 2018(Updated: )
If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. External Reference: <a href="https://www.mozilla.org/en-US/security/advisories/mfsa2018-20/#CVE-2018-12383">https://www.mozilla.org/en-US/security/advisories/mfsa2018-20/#CVE-2018-12383</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <58 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1625531 is classified as a moderate security issue due to the exposure of stored passwords.
To fix REDHAT-BUG-1625531, you should update to Firefox version 58 or newer and ensure all exported passwords are deleted.
Firefox versions prior to 58 are affected by REDHAT-BUG-1625531.
If REDHAT-BUG-1625531 is not addressed, unencrypted copies of saved passwords may remain accessible.
Using a master password does not secure your older saved passwords in versions affected by REDHAT-BUG-1625531.