Cyber Posture

CVE-2026-6772

High

Published: 21 April 2026

Published
21 April 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0005 15.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates timely identification, reporting, and correction of software flaws like CVE-2026-6772 through patching NSS in affected Firefox and Thunderbird versions.

detect

Enables automated scanning and monitoring to identify systems with vulnerable NSS library versions exploited by this boundary condition flaw.

detect

Provides for receiving and distributing Mozilla security advisories (MFSA2026-*) reporting CVE-2026-6772 to initiate remediation.

Security SummaryAI

CVE-2026-6772 is a vulnerability involving incorrect boundary conditions in the Libraries component of NSS (Network Security Services). It affects Mozilla products that incorporate NSS, including Firefox versions prior to 150, Firefox ESR prior to 115.35 and 140.10, Thunderbird prior to 150, and Thunderbird prior to 140.10. The issue, classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions), carries a CVSS v3.1 base score of 7.5, reflecting high severity due to its network accessibility and potential for significant impact.

The vulnerability enables exploitation by any remote, unauthenticated attacker (AV:N/AC:L/PR:N/UI:N) over the network with low complexity and no user interaction required. Successful exploitation results in high confidentiality impact (C:H), allowing attackers to disclose sensitive information without affecting integrity or availability (S:U/I:N/A:N).

Mozilla security advisories (MFSA2026-30 through MFSA2026-33) and the associated Bugzilla entry detail the patch deployment, confirming fixes in Firefox 150, Firefox ESR 115.35 and 140.10, Thunderbird 150, and Thunderbird 140.10. Security practitioners should prioritize updating to these versions to mitigate the risk.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 115.35.0 · ≤ 150.0 · 140.0 — 140.10.0
mozilla
thunderbird
≤ 140.10.0

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

The vulnerability allows remote unauthenticated attackers to disclose sensitive information from the affected Mozilla client applications, directly facilitating collection of data from the local system.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

References