EUVD-2025-18100

| CVE-2025-49710 CRITICAL
2025-06-11 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 14, 2026 - 21:09 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:09 euvd
EUVD-2025-18100
CVE Published
Jun 11, 2025 - 12:15 nvd
CRITICAL 9.8

Description

An integer overflow was present in `OrderedHashTable` used by the JavaScript engine This vulnerability affects Firefox < 139.0.4.

Analysis

An integer overflow vulnerability exists in the OrderedHashTable component of Firefox's JavaScript engine, allowing remote attackers to achieve arbitrary code execution without requiring user interaction or elevated privileges. This critical flaw affects Firefox versions prior to 139.0.4 and carries a maximum CVSS score of 9.8, indicating severe real-world risk with network-based attack vectors requiring no user interaction.

Technical Context

The vulnerability resides in OrderedHashTable, a core data structure within the SpiderMonkey JavaScript engine used by Firefox. Integer overflow vulnerabilities (CWE-190) in hash table implementations can lead to memory corruption when size calculations fail to properly validate boundaries during allocation or indexing operations. When an integer overflow occurs during size computation, subsequent memory operations may write beyond allocated buffer boundaries or read from unintended memory locations, compromising memory safety guarantees. This affects CPE:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* with versions below 139.0.4 being vulnerable. The OrderedHashTable is fundamental to JavaScript object property storage, making it a high-impact target in the engine's execution path.

Affected Products

Mozilla Firefox (Firefox < 139.0.4)

Remediation

- priority: CRITICAL; action: Immediate patching; details: Update Firefox to version 139.0.4 or later. Users can enable automatic updates in Firefox preferences (Settings > General > Firefox Updates) or manually download the latest version from mozilla.org. - priority: HIGH; action: Organizational deployment; details: Enterprise administrators should deploy Firefox 139.0.4+ through centralized update mechanisms (ADMX templates, MDM solutions) to all endpoints immediately. Do not delay for testing cycles given the critical CVSS and network-based attack vector. - priority: MEDIUM; action: Defense-in-depth; details: Until patches can be deployed universally, consider supplementary mitigations: disable JavaScript in Firefox via about:config (javascript.enabled = false) for high-risk users, implement content security policies on web servers, deploy browser isolation technologies for sensitive operations, monitor for suspicious memory access patterns in web logs. - priority: MEDIUM; action: Monitoring; details: Monitor Firefox crash reports and system logs for exploitation indicators (segmentation faults in spidermonkey, unexpected code execution). Implement EDR/XDR solutions with JavaScript execution monitoring capabilities.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +49
POC: 0

Vendor Status

Ubuntu

Priority: Medium
firefox
Release Status Version
jammy not-affected code not present
noble not-affected code not present
oracular not-affected code not present
plucky not-affected code not present
upstream needs-triage -
focal DNE -
questing not-affected code not present
thunderbird
Release Status Version
noble not-affected code not present
oracular not-affected code not present
plucky not-affected code not present
upstream needs-triage -
jammy not-affected code not present
focal DNE -
questing not-affected code not present
mozjs38
Release Status Version
bionic needs-triage -
jammy DNE -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -
mozjs52
Release Status Version
bionic ignored -
focal ignored -
jammy DNE -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -
mozjs68
Release Status Version
focal ignored -
jammy DNE -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -
mozjs78
Release Status Version
jammy ignored -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -
mozjs91
Release Status Version
jammy ignored -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -
mozjs102
Release Status Version
jammy ignored -
noble ignored -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -
mozjs115
Release Status Version
jammy DNE -
noble ignored -
oracular ignored -
plucky ignored -
upstream needs-triage -
questing DNE -

Debian

firefox
Release Status Fixed Version Urgency
sid fixed 148.0.2-1 -
(unstable) fixed 139.0.4-1 -

Share

EUVD-2025-18100 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy