Cyber Posture

CVE-2026-4690

High

Published: 24 March 2026

Published
24 March 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
EPSS Score 0.0002 3.8th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely identification, reporting, and correction of flaws such as the integer overflow and boundary condition error in the XPCOM sandbox component via patching to fixed Firefox and Thunderbird versions.

prevent

Implements memory protection mechanisms that defend against exploitation of integer overflows leading to buffer overflows and sandbox escapes.

prevent

Enforces process isolation to strengthen sandbox boundaries and mitigate escapes resulting from flaws in components like XPCOM.

Security SummaryAI

CVE-2026-4690 is a sandbox escape vulnerability stemming from incorrect boundary conditions and an integer overflow in the XPCOM component. It affects Mozilla Firefox versions prior to 149, Firefox ESR prior to 115.34 and 140.9, Thunderbird prior to 149 and 140.9. The issue is rated with a CVSS v3.1 base score of 8.6 and is associated with CWEs 190 (Integer Overflow or Wraparound), 754 (Improper Check for Unusual or Exceptional Conditions), and 120 (Buffer Copy without Checking Size of Input).

A remote attacker requires no privileges or user interaction and can exploit this over the network with low complexity. Successful exploitation results in a sandbox escape with a changed scope, leading to high availability impact such as denial of service, though without direct confidentiality or integrity violations.

Mozilla's security advisories (MFSA 2026-20 through 2026-23) and the associated Bugzilla entry detail the patch, recommending immediate updates to Firefox 149, Firefox ESR 115.34 or 140.9, Thunderbird 149, or Thunderbird 140.9 to mitigate the vulnerability.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 115.34.0 · ≤ 149.0 · 128.0 — 140.9.0

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Sandbox escape via remote client exploitation enables privilege escalation (T1068) and client-side code execution (T1203); high availability impact directly supports DoS via application exploitation (T1499.004).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

References