Friday, April 11, 2025
HomeCVE/vulnerabilityMozilla Addresses High-Severity Memory Safety Vulnerabilities in Firefox 135.0.1

Mozilla Addresses High-Severity Memory Safety Vulnerabilities in Firefox 135.0.1

Published on

SIEM as a Service

Follow Us on Google News

Mozilla released Firefox 135.0.1 on February 18, 2025, as an emergency security update to patch multiple high-severity memory safety vulnerabilities.

The update specifically addresses CVE-2025-1414, a critical flaw that could enable arbitrary code execution and compromise user systems.

This marks the first major security patch for Firefox in 2025 and underscores ongoing challenges in browser security.

- Advertisement - Google News

High-Severity Memory Corruption Risks

The vulnerabilities, classified as “high” impact by Mozilla’s security team, stemmed from memory safety flaws in Firefox 135’s JavaScript engine and graphics rendering components.

These bugs created scenarios where attackers could exploit memory corruption to crash browsers or execute malicious code.

According to Mozilla’s advisory, at least two of the patched vulnerabilities showed evidence of exploitability in controlled environments, though no active attacks have been confirmed.

Andrew McCreight, the Mozilla engineer credited with reporting the flaws, noted that the issues arose from race conditions in multi-threaded processes handling complex web content.

“Memory safety remains one of the most persistent challenges in large-scale software development,” McCreight stated in the advisory.

Update Urgency and Mitigation

Firefox 135.0.1 is flagged as a mandatory update for all users, including those on Windows, macOS, and Linux.

Mozilla confirmed that the vulnerabilities affect Firefox 135 across all platforms, though mobile versions (Android/iOS) remain unaffected.

Users with automatic updates enabled should already have the patch, while others can trigger a manual update via “About Firefox” in the browser menu.

The update follows Mozilla’s accelerated response protocol for memory safety flaws, reflecting lessons learned from prior incidents like 2023’s CVE-2023-4863 zero-day exploit.

A Mozilla spokesperson emphasized, “Proactive patching is critical—even theoretical vulnerabilities demand immediate action given modern attack sophistication”.

Security researchers have praised the patch’s swift rollout but caution that users delaying updates remain vulnerable to drive-by downloads or malicious ads exploiting these flaws.

“Every hour counts when high-severity CVEs are public,” warned Tavis Ormandy of Google’s Project Zero.

Mozilla plans additional “stability enhancements” in Firefox 136, slated for March 4, 2025.

Meanwhile, users are advised to verify their browser version and enable automatic updates. Enterprises utilizing Firefox Extended Support Release (ESR) should expect backported fixes in ESR 135.1 within 72 hours.

This incident reinforces the critical role of update diligence in an era where unpatched browsers serve as primary attack vectors.

As cyber threats grow increasingly sophisticated, Mozilla’s rapid response exemplifies the collaborative security ethos underpinning open-source browser development.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hands-On Labs: The Key to Accelerating CMMC 2.0 Compliance

INE Security Highlights How Practical, immersive training environments help defense contractors meet DoD cybersecurity...

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hands-On Labs: The Key to Accelerating CMMC 2.0 Compliance

INE Security Highlights How Practical, immersive training environments help defense contractors meet DoD cybersecurity...

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...