CVE-2026-6764
Published: 21 April 2026
Description
Incorrect boundary conditions in the DOM: Device Interfaces component. This vulnerability was fixed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Ongoing control assessments and code testing (static/dynamic analysis, fuzzing) surface memory buffer restriction failures, which are then remediated before release.
Managed runtimes used by platform-independent applications (e.g., JVM, CLR) enforce memory safety, preventing most buffer overflows that require direct memory manipulation.
Memory protections (e.g., W^X, ASLR) make exploitation of buffer-boundary violations far harder to turn into code execution.
Detects exploitation attempts that produce memory corruption, crashes, or anomalous behavior.
Security SummaryAI
CVE-2026-6764 is a vulnerability involving incorrect boundary conditions in the DOM: Device Interfaces component, classified under CWE-119. It affects Mozilla Firefox, Firefox ESR, and Thunderbird. The issue was addressed in Firefox version 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10. The vulnerability received a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L), indicating medium severity with network accessibility, low attack complexity, no privileges or user interaction required, and impacts limited to low integrity and availability without confidentiality loss or scope change.
Remote attackers can exploit this vulnerability over the network without authentication or user interaction. Successful exploitation allows limited disruption, such as minor integrity violations (e.g., data modification) or availability issues (e.g., denial of service), but does not enable data exfiltration or broader system compromise.
Mozilla's security advisories (MFSA2026-30 through MFSA2026-34) and the associated Bugzilla entry (bug 2022162) detail the fix applied in the specified versions. Security practitioners should ensure affected products are updated to these patched releases to mitigate the risk.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Browser memory boundary flaw (CWE-119) with network trigger and low-integrity/availability impact directly supports application exploitation for DoS (T1499.004) and enables drive-by delivery via malicious web content (T1189).