CVE Vulnerabilities

CVE-2019-9812

Published: Jan 08, 2020 | Modified: Nov 25, 2025
CVSS 3.x
9.3
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:P
RedHat/V2
RedHat/V3
9.3 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

Affected Software

NameVendorStart VersionEnd Version
FirefoxMozilla*60.9 (excluding)
FirefoxMozilla*69.0 (excluding)
FirefoxMozilla61.0 (including)68.1 (excluding)
Red Hat Enterprise Linux 6RedHatfirefox-0:60.9.0-1.el6_10*
Red Hat Enterprise Linux 7RedHatfirefox-0:60.9.0-1.el7_7*
Red Hat Enterprise Linux 8RedHatfirefox-0:68.1.0-1.el8_0*
FirefoxUbuntubionic*
FirefoxUbuntudevel*
FirefoxUbuntudisco*
FirefoxUbuntueoan*
FirefoxUbuntufocal*
FirefoxUbuntugroovy*
FirefoxUbuntuhirsute*
FirefoxUbuntuimpish*
FirefoxUbuntujammy*
FirefoxUbuntukinetic*
FirefoxUbuntulunar*
FirefoxUbuntumantic*
FirefoxUbuntunoble*
FirefoxUbuntuupstream*
FirefoxUbuntuxenial*
Mozjs38Ubuntubionic*
Mozjs38Ubuntuesm-apps/bionic*
Mozjs38Ubuntuupstream*
Mozjs52Ubuntubionic*
Mozjs52Ubuntudisco*
Mozjs52Ubuntueoan*
Mozjs52Ubuntuesm-apps/focal*
Mozjs52Ubuntuesm-infra/bionic*
Mozjs52Ubuntufocal*
Mozjs52Ubuntugroovy*
Mozjs52Ubuntuupstream*
Mozjs60Ubuntudisco*
Mozjs60Ubuntueoan*
Mozjs60Ubuntuupstream*

References