Cyber Posture

CVE-2026-2776

Critical

Published: 24 February 2026

Published
24 February 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0003 8.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely identification, reporting, and patching of flaws like CVE-2026-2776 in Mozilla software to eliminate the sandbox escape vulnerability.

prevent

Implements memory protection safeguards such as DEP and ASLR to prevent exploitation of the buffer overflow (CWE-119) underlying the sandbox escape.

prevent

Enforces robust process isolation to contain the Telemetry component within the sandbox, mitigating escape even if boundary conditions are flawed.

Security SummaryAI

CVE-2026-2776 is a sandbox escape vulnerability stemming from incorrect boundary conditions in the Telemetry component of External Software. It affects Mozilla Firefox versions prior to 148, Firefox ESR versions prior to 115.33 and 140.8, Thunderbird versions prior to 148 and 140.8. The issue is associated with CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its potential for complete system compromise.

A remote attacker can exploit this vulnerability over the network with low complexity, requiring no privileges or user interaction. Successful exploitation allows escape from the sandbox, enabling high-impact confidentiality, integrity, and availability violations across the affected scope, potentially leading to arbitrary code execution with elevated privileges.

Mozilla's security advisories (MFSA 2026-13 through 2026-16) and Bugzilla entry 2015266 detail the fix applied in the listed versions of Firefox and Thunderbird. Security practitioners should prioritize updating to these patched releases to mitigate the risk, as no additional workarounds are specified in the provided references.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 115.33.0 · ≤ 148.0 · 128.0 — 140.8.0
mozilla
thunderbird
≤ 140.8.0 · ≤ 148.0

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Sandbox escape in client application (Firefox/Thunderbird) directly enables privilege escalation from contained process and client-side code execution via remote exploitation with no user interaction required.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References