Cyber Posture

CVE-2026-2757

Critical

Published: 24 February 2026

Published
24 February 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0007 21.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 directly mandates timely remediation of known flaws like CVE-2026-2757 by applying patches to vulnerable Firefox and Thunderbird versions, preventing remote code execution.

detect

RA-5 requires vulnerability scanning to identify systems running affected Firefox and Thunderbird versions prior to the patched releases.

detect

SI-5 ensures monitoring of vendor security advisories such as Mozilla's MFSA 2026-13 through 2026-16 to promptly learn of and address CVE-2026-2757.

Security SummaryAI

CVE-2026-2757 is a high-severity vulnerability stemming from incorrect boundary conditions in the WebRTC Audio/Video component of Mozilla products. It affects Firefox versions prior to 148, Firefox ESR versions prior to 115.33 and 140.8, Thunderbird versions prior to 148, and Thunderbird versions prior to 140.8. The issue is cataloged under CWE-1384 with an additional NVD-CWE-noinfo mapping and carries a CVSS v3.1 base score of 9.8.

The vulnerability enables exploitation over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N), and without changing scope (S:U). Remote attackers can thus achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), potentially leading to full system compromise such as arbitrary code execution via malicious WebRTC traffic.

Mozilla's security advisories (MFSA 2026-13 through 2026-16) and the associated Bugzilla entry (bug 2001637) detail the fix applied in the listed versions. Security practitioners should prioritize updating affected Firefox and Thunderbird installations to the patched releases to mitigate the risk.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 115.33.0 · ≤ 148.0 · 128.0 — 140.8.0
mozilla
thunderbird
≤ 140.8.0 · ≤ 148.0

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Remote unauthenticated RCE via malicious WebRTC traffic in client applications (Firefox/Thunderbird) directly enables client-side exploitation for code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References