Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-11753


The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. <br>*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox < 69, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Published

2019-09-27T18:15:13.677

Last Modified

2024-11-21T04:21:43.497

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

3.9

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-354

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mozilla firefox < 69.0 Yes
Application mozilla firefox_esr < 60.9.0 Yes
Application mozilla firefox_esr < 68.1.0 Yes
Operating System microsoft windows - No

References