CVE-2026-2785
Published: 24 February 2026
Description
Invalid pointer in the JavaScript Engine component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely identification, reporting, and correction of flaws such as this invalid pointer dereference in the JavaScript engine via vendor patches.
Implements memory protection controls like address space layout randomization and data execution prevention to mitigate exploitation of invalid pointer vulnerabilities.
Requires vulnerability scanning to identify systems affected by CVE-2026-2785 in the JavaScript engine prior to exploitation.
Security SummaryAI
CVE-2026-2785 is an invalid pointer vulnerability (CWE-824) in the JavaScript Engine component of Mozilla products. It affects Firefox versions prior to 148, Firefox ESR versions prior to 140.8, Thunderbird versions prior to 148, and Thunderbird versions prior to 140.8. The issue has a CVSS v3.1 base score of 9.8, indicating critical severity.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation can result in high impacts to confidentiality, integrity, and availability, potentially allowing arbitrary code execution within the context of the affected browser or email client.
Mozilla security advisories (MFSA 2026-13, 15, 16, and 17) and the associated Bugzilla entry detail the patch releases that address the vulnerability. Mitigation involves updating to Firefox 148, Firefox ESR 140.8, Thunderbird 148, or Thunderbird 140.8, as these versions include the necessary fixes for the invalid pointer dereference in the JavaScript Engine.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Invalid pointer dereference in JS engine enables remote arbitrary code execution in browser/email clients with no auth/UI required, directly mapping to drive-by compromise (malicious site/JS payload) and exploitation for client execution.