Cyber Posture

CVE-2026-6766

High

Published: 21 April 2026

Published
21 April 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0004 13.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely remediation of identified flaws, such as applying patches for the NSS boundary condition vulnerability in CVE-2026-6766 affecting Firefox and Thunderbird.

detect

Requires vulnerability scanning to identify systems running unpatched versions of NSS in Mozilla products exploitable by CVE-2026-6766.

preventdetect

Ensures organizations receive and act on security advisories like Mozilla MFSA 2026-30 detailing the NSS vulnerability and required updates.

Security SummaryAI

CVE-2026-6766 is a vulnerability involving incorrect boundary conditions in the Libraries component of NSS (Network Security Services). NSS is a set of libraries used for cryptographic and security functions in Mozilla products, specifically affecting Firefox, Firefox ESR, and Thunderbird prior to their respective patched versions.

The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating it can be exploited remotely by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation allows attackers to achieve high-impact confidentiality violations, such as disclosing sensitive information processed or stored by affected applications.

Mozilla security advisories (MFSA 2026-30 through 2026-34) and the associated Bugzilla entry detail the fix applied in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10. Security practitioners should ensure these updates are applied to mitigate the issue, as classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions).

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 140.10.0 · ≤ 150.0
mozilla
thunderbird
≤ 140.10.0

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

The vulnerability enables remote unauthenticated disclosure of sensitive information from affected applications via an out-of-bounds condition in NSS, directly facilitating collection of data from the local system.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

References