Mozilla Firefox < 131.0.2 — RCE
A use-after-free in Firefox's animation timeline processing allows remote code execution within the browser sandbox. Update to Firefox 131.0.2 immediately — exploited in the wild as a zero-day.
An attacker who hosts a malicious website can achieve code execution in the Firefox renderer process. Combined with a sandbox escape, this can lead to full system compromise. Even without sandbox escape, the attacker can steal browser data, session cookies, and saved passwords.
Firefox has a use-after-free vulnerability in the handling of CSS animation timelines. When a web page creates an animation and then manipulates the timeline in a specific sequence, Firefox accesses freed memory, allowing an attacker-controlled web page to corrupt heap memory and achieve code execution within the Firefox process.
📧
Phishing link
🖼
Malicious file
🔓
Server compromised
Probably yes if any of these apply:
Affected OS versions
Mozilla disclosed and patched CVE-2024-9680 as an out-of-band emergency update on October 9, 2024. CISA added it to the Known Exploited Vulnerabilities catalog on October 11, 2024. Mozilla credited ESET for reporting and noted the vulnerability was being actively exploited in the wild. The fix was available within hours of Mozilla being notified.
Manual remediation steps
⏱ 5 minutes (browser update, no reboot required)Check Firefox Version
# Check installed version:
$ffPath = "C:\Program Files\Mozilla Firefox\firefox.exe"
if (Test-Path $ffPath) {
(Get-Item $ffPath).VersionInfo.FileVersion
}
# Or check via registry:
Get-ItemProperty "HKLM:\SOFTWARE\Mozilla\Mozilla Firefox" -ErrorAction SilentlyContinue |
Select-Object CurrentVersion
Update Firefox Immediately
# Option 1: Open Firefox and navigate to:
# Help > About Firefox > Check for Updates
# Option 2: Use winget (if available):
winget upgrade Mozilla.Firefox
# Option 3: Download Firefox 131.0.2 installer from https://www.mozilla.org/firefox/
Verify the Update
(Get-Item "C:\Program Files\Mozilla Firefox\firefox.exe").VersionInfo.FileVersion
# Must show 131.0.2 or later
Enterprise Deployment (Group Policy / SCCM)
# Download the MSI from https://www.mozilla.org/en-US/firefox/enterprise/
# Deploy via SCCM or Intune as a software update
# Or use the Mozilla ADMX templates to enforce auto-update
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.
References