Firefox Zero-Day RCE Caused by Single-Character Typo in SpiderMonkey Engine

Related

DigitStealer Infostealer Targets macOS Systems and Cryptocurrency Wallet Data

What happened A macOS-targeting infostealer called DigitStealer has seen increased...

QR Code Phishing Campaigns Deliver Malicious Links and Mobile Malware

What happened Security researchers at Palo Alto Networks Unit 42...

Carding-as-a-Service Marketplaces Fuel Surge in Global Credit Card Fraud

What happened Cybercriminals have built sophisticated Carding-as-a-Service (CaaS) marketplaces that...

Share

What happened

A critical remote code execution vulnerability in Mozilla Firefox was discovered in the SpiderMonkey JavaScript engine due to a single-character typo where a developer used the bitwise AND operator (“&”) instead of OR (“|”) in WebAssembly garbage collection code. The flaw, discovered by security researcher Erge, caused memory corruption by incorrectly tagging relocated arrays, creating a use-after-free condition that allowed arbitrary read/write access and execution of system commands. The vulnerability affected Firefox 149 Nightly builds, where the researcher demonstrated full exploitation by spawning a shell, but it was fixed quickly after disclosure and never reached stable release versions. 

Who is affected

Users running vulnerable Mozilla Firefox Nightly builds, specifically Firefox 149 Nightly, were affected, though the flaw did not impact stable release versions after being patched by Mozilla.

Why CISOs should care

The vulnerability demonstrates how low-level memory handling flaws in browser engines can enable arbitrary code execution, highlighting risks associated with widely deployed software used across enterprise environments.

3 practical actions

  • Update Firefox Nightly builds immediately. Ensure all systems use patched versions that include Mozilla’s security fix.
  • Restrict use of unstable browser builds. Limit Nightly or experimental browser versions in enterprise environments.
  • Monitor systems for exploitation indicators. Review endpoint activity for signs of abnormal browser behavior or unauthorized code execution.