Cyber Posture

CVE-2026-6753

High

Published: 21 April 2026

Published
21 April 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0006 18.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Incorrect boundary conditions in the WebRTC component. This vulnerability was fixed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires organizations to identify, report, and correct system flaws like the WebRTC boundary condition error (CWE-119), directly enabling timely patching as provided in Firefox 150 and ESR 140.10.

detect

Mandates vulnerability scanning to identify deployed vulnerable versions of Firefox and Thunderbird affected by this remotely exploitable WebRTC flaw.

preventdetect

Ensures monitoring and dissemination of vendor security advisories like MFSA 2026-30, facilitating awareness and application of fixes for this CVE.

Security SummaryAI

CVE-2026-6753 involves incorrect boundary conditions in the WebRTC component, classified under CWE-119. This vulnerability affects Mozilla Firefox versions prior to 150, Firefox ESR prior to 140.10, Thunderbird prior to 150, and Thunderbird prior to 140.10. It was published on 2026-04-21 and carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity due to its network accessibility and low barriers to exploitation.

Remote attackers can exploit this vulnerability over the network with low attack complexity, requiring no privileges, user interaction, or special conditions. Successful exploitation allows limited impacts, including partial disclosure of sensitive information, partial modification of data, and partial denial of service.

Mozilla security advisories (MFSA 2026-30, 32, 33, and 34) and the associated Bugzilla entry (bug 2027501) detail the fix applied in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10, recommending immediate upgrades to these versions for mitigation.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 140.10.0 · ≤ 150.0
mozilla
thunderbird
140.0 — 140.10.0

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Memory corruption (CWE-119) in client-side WebRTC component of Firefox/Thunderbird enables remote exploitation for client execution (T1203) with no privileges or user interaction required.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References