IRONSMITHINTEL
CRITICALCVSS9.8
|
Actively Exploited
|CISA KEV|CVE-2024-29943|Auth: none — visiting a malicious page is sufficient|Reboot: not required|Est. 5 minutes (browser restart only)|Manual only

Mozilla Firefox < 124.0.1 — RCE

An out-of-bounds memory access in Firefox's JIT compiler enables remote code execution. Update to Firefox 124.0.1 — exploited in the wild, with a privileged JavaScript execution escape chained in the same attack.

Published Mar 22, 2024 · Updated May 8, 2026
Why patchRisk explained in plain English
Worst-case scenarioIf unpatched

An attacker serving a malicious web page can achieve full code execution outside the Firefox sandbox, with the same privileges as the user running Firefox. This can be used to install malware, steal credentials, and establish persistence without any user interaction beyond visiting the page.

How the attack worksNo clicks needed

Firefox's SpiderMonkey JavaScript engine has an out-of-bounds access vulnerability (CVE-2024-29943) through a technique called "range analysis bypass." This allows JavaScript running in a web page to read and write outside the bounds of a JavaScript array object. Combined with CVE-2024-29944 (privileged JavaScript execution in the parent process), this enables a full sandbox escape.

📧

Phishing link

🖼

Malicious file

🔓

Server compromised

Am I affected?Quick check

Probably yes if any of these apply:

All Windows users with Firefox
IT Administrators
Desktop Support
Running Firefox prior to 124.0.1, Firefox ESR prior to 115.9.1

Affected OS versions

Windows 10Windows 11Windows Server 2019Windows Server 2022
Fixed inFirefox 124.0.1 / Firefox ESR 115.9.1
Real-world incidentsWhat we've seen

Mozilla released an emergency patch on March 22, 2024, noting both CVEs were being exploited in the wild. The chained exploit (CVE-2024-29943 + CVE-2024-29944) provides a complete browser-to-system compromise, which is a rare and high-value attack primitive. Mozilla credited security researchers for reporting the chain after observing active exploitation.

How to patch

Manual remediation steps

5 minutes (browser restart only)

Check Firefox Version

(Get-Item "C:\Program Files\Mozilla Firefox\firefox.exe").VersionInfo.FileVersion
# Vulnerable if older than 124.0.1

Update Firefox

# Via winget:
winget upgrade Mozilla.Firefox

# Or open Firefox: Help > About Firefox > Check for Updates

Verify

(Get-Item "C:\Program Files\Mozilla Firefox\firefox.exe").VersionInfo.FileVersion
# Must show 124.0.1 or later
PowerShell automationComing soon

No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.