Mozilla has released an urgent update for Firefox on Windows to address a critical vulnerability.
This move comes after a similar exploit was identified in Google Chrome, highlighting the need for swift action to protect users.
The latest update affects Firefox 136.0.4 and Firefox Extended Support Release (ESR) versions 128.8.1 and 115.21.1.
The fix is specifically designed to mitigate a sandbox escape vulnerability, which could lead to a compromised child process manipulating the parent process into returning an overly powerful handle.
CVE-2025-2857 is a critical issue identified by Firefox developers after analyzing a similar pattern in their Inter-Process Communication (IPC) code.
This vulnerability, although related to a known Chrome exploit (CVE-2025-2783), is unique to Firefox.
The situation is compounded by evidence that this vulnerability was being exploited in the wild, emphasizing the urgency of the patch.
Impact Details:
The recent Chrome exploit, referred to as CVE-2025-2783, has highlighted vulnerabilities in sandboxing technologies used by major browsers.
A sandbox escape allows malicious actors to bypass security restrictions designed to isolate processes and potentially execute harmful code outside the intended boundaries.
Mozilla’s proactive stance in identifying and resolving the issue quickly underscores its commitment to user security.
By closely monitoring the evolving threat landscape and collaborating with security researchers, Mozilla has managed to address the vulnerability before it could cause significant damage.
Firefox users on Windows are advised to update their browsers to the latest version as soon as possible. Users can check for updates within Firefox by navigating to the “Help” menu and selecting “About Firefox.”
The update will install automatically if an internet connection is available.
The swift release of updates by Mozilla reflects the ever-changing nature of cybersecurity threats and the importance of staying vigilant.
As technology evolves, so too do the tactics of those seeking to exploit vulnerabilities. Users should remain alert and follow best practices for keeping their software up to date to ensure their online safety.
Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free.
In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation HollowQuill,…
A new wave of cyberattacks orchestrated by the advanced persistent threat (APT) group Earth Alux…
The term "Lazarus Group," once used to describe a singular Advanced Persistent Threat (APT) actor,…
DarkCloud, a highly advanced stealer malware, has emerged as a significant threat to Windows systems…
Cado Security Labs has uncovered a new Python-based Remote Access Tool (RAT) named Triton RAT,…
Russian-aligned cyber threat groups, UAC-0050 and UAC-0006, have significantly escalated their operations in 2025, targeting…