CVE-2026-4687
Published: 24 March 2026
Description
Sandbox escape due to incorrect boundary conditions in the Telemetry component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely patching and remediation of known flaws like the sandbox escape in CVE-2026-4687 fixed in specified Firefox and Thunderbird versions.
Mandates validation of information inputs to address the buffer copy without size checking (CWE-120) and improper boundary conditions in the Telemetry component.
Implements memory protections to mitigate exploitation of buffer-related vulnerabilities that enable sandbox escapes and availability disruptions.
Security SummaryAI
CVE-2026-4687 is a sandbox escape vulnerability caused by incorrect boundary conditions in the Telemetry component of Mozilla Firefox and Thunderbird. Published on 2026-03-24, it carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) and maps to CWE-754 (Improper Check for Unusual or Exceptional Conditions) and CWE-120 (Buffer Copy without Checking Size of Input). The flaw affects Firefox and Thunderbird versions prior to the patched releases.
Remote attackers can exploit this vulnerability over the network with low attack complexity, requiring no privileges, user interaction, or authentication. Exploitation results in a change of scope from the sandboxed context, enabling high-impact availability disruption such as application crashes or denial of service, while confidentiality and integrity remain unaffected.
Mozilla fixed the vulnerability in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. Security advisories MFSA2026-20, MFSA2026-21, MFSA2026-22, and MFSA2026-23, along with Bugzilla entry 2016368, provide further details on the patches and recommend immediate updates to mitigate the risk.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Sandbox escape with scope change directly enables privilege escalation (T1068) and client-side exploitation (T1203); explicit availability impact via crashes maps to application exploitation for DoS (T1499.004).