CVE-2026-2802
Published: 24 February 2026
Description
Race condition in the JavaScript: GC component. This vulnerability was fixed in Firefox 148 and Thunderbird 148.
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Accurate timestamps from internal clocks enable detection of race conditions by providing reliable event ordering in audit logs.
Coordination of concurrent security activities reduces the probability that shared resources will be accessed simultaneously without proper synchronization.
Security SummaryAI
CVE-2026-2802 is a race condition vulnerability (CWE-362) in the JavaScript Garbage Collector (GC) component of Mozilla Firefox and Thunderbird. It affects versions prior to Firefox 148 and Thunderbird 148, where the flaw allows concurrent access issues during garbage collection operations in JavaScript execution. The vulnerability has a CVSS v3.1 base score of 4.2 (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N), rated as Medium severity due to its network accessibility but high attack complexity and requirement for user interaction.
An unauthenticated remote attacker can exploit this vulnerability by crafting malicious web content that triggers the race condition in the JavaScript GC, typically requiring the user to interact with a malicious webpage or link. Successful exploitation could result in limited impacts, such as low-level disclosure of sensitive information or minor modification of data, without affecting availability or escalating privileges.
Mozilla's security advisories (MFSA 2026-13 and MFSA 2026-16) and the associated Bugzilla entry (bug 2011069) confirm the issue was addressed in Firefox 148 and Thunderbird 148. Security practitioners should prioritize updating affected browsers to these patched versions to mitigate the risk, as no workarounds are detailed in the provided references.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability enables drive-by exploitation of browser via malicious web content requiring user interaction (T1189, T1204.001) and direct client-side exploitation for limited info disclosure/data modification (T1203).