--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Critical Vulnerabilities in Firefox' version: '1.0' number: '2020-020' date: 'April 6, 2020' --- _History:_ * _06/04/2020 --- v1.0 -- Initial publication_ # Summary On the 3rd of April 2020, Mozilla released an advisory concerning two critical vulnerabilities affecting Firefox browser [1]. According to Mozilla, both vulnerabilities are related to `use-after-free` bugs and have been exploited in the wild in targeted attacks. It is strongly recommended to update **Firefox** and **Firefox ESR** to the latest version available. # Technical Details The vulnerability CVE-2020-6819 with **critical severity** is a `use-after-free` flaw, caused by a race condition while running the `nsDocShell destructor`. The vulnerability CVE-2020-6820 with **critical severity** is a `use-after-free` flaw, caused by a race condition when handling a `ReadableStream`. It is unclear how these vulnerabilities can be exploited, only that attacks happen right now that exploit them [2]. `ReadableStream` is used to read data streams, `nsDocShell`'s issue seems to have been caused by data not being released properly. # Products Affected List of all affected products: * Firefox before 74.0.1 * Firefox ESR before 68.6.1 # Recommendations Update Firefox products to the latest versions: * Firefox 74.0.1 * Firefox ESR 68.6.1 # References [1] [2]