Cyber Posture

CVE-2026-2806

Critical

Published: 24 February 2026

Published
24 February 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0006 19.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Uninitialized memory in the Graphics: Text component. This vulnerability was fixed in Firefox 148 and Thunderbird 148.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 mandates timely flaw remediation, directly requiring patching of Firefox and Thunderbird to version 148 to eliminate the uninitialized memory vulnerability.

prevent

SI-16 implements memory protection controls like ASLR and stack canaries that mitigate exploitation of uninitialized memory for information disclosure and denial-of-service.

prevent

SI-5 ensures receipt and action on vendor security advisories like MFSA 2026-13, enabling prompt awareness and patching of CVE-2026-2806.

Security SummaryAI

CVE-2026-2806 is a critical vulnerability involving uninitialized memory in the Graphics: Text component, affecting Mozilla Firefox and Thunderbird. Assigned CWE-908 (Use of Uninitialized Resource) and CWE-457 (Use of Uninitialized Variable), it received a CVSS v3.1 base score of 9.1, reflecting its high severity due to network accessibility, low attack complexity, and no requirements for privileges or user interaction.

A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction. Successful exploitation enables high-impact confidentiality violations, such as disclosure of sensitive information from uninitialized memory, alongside high-impact availability disruptions, potentially leading to denial-of-service conditions like application crashes.

Mozilla addressed the issue in Firefox version 148 and Thunderbird version 148, as detailed in security advisories MFSA 2026-13 and MFSA 2026-16, along with the upstream bug report at Bugzilla ID 2006199. Security practitioners should ensure affected systems are updated to these patched versions to mitigate the risk.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 148.0
mozilla
thunderbird
≤ 148.0

MITRE ATT&CK Enterprise TechniquesAI

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Uninitialized memory use in browser graphics/text enables remote exploitation via malicious web content (drive-by) with no user interaction required, directly supporting T1189; the described high-impact crashes also map to application exploitation for DoS under T1499.004. No RCE or code execution is indicated, limiting additional mappings.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

References