Search for vulnerabilities
Vulnerability details: VCID-9e28-p8t5-aaak
Vulnerability ID VCID-9e28-p8t5-aaak
Aliases CVE-2020-26950
Summary In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual High http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-26950.html
rhas Critical https://access.redhat.com/errata/RHSA-2020:5099
rhas Critical https://access.redhat.com/errata/RHSA-2020:5100
rhas Critical https://access.redhat.com/errata/RHSA-2020:5104
rhas Critical https://access.redhat.com/errata/RHSA-2020:5135
rhas Critical https://access.redhat.com/errata/RHSA-2020:5138
rhas Critical https://access.redhat.com/errata/RHSA-2020:5139
rhas Important https://access.redhat.com/errata/RHSA-2020:5146
rhas Important https://access.redhat.com/errata/RHSA-2020:5162
rhas Important https://access.redhat.com/errata/RHSA-2020:5163
rhas Important https://access.redhat.com/errata/RHSA-2020:5164
rhas Important https://access.redhat.com/errata/RHSA-2020:5166
rhas Important https://access.redhat.com/errata/RHSA-2020:5167
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26950.json
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.55139 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.67893 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.67893 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.70263 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.71446 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.71446 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.71446 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.71446 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.71446 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.71446 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.71446 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.71446 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.71446 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.71446 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.71446 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.76006 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.76006 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.76006 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.76006 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.76006 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.76006 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.76006 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.76006 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.76006 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.76006 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.86051 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.86051 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.86051 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.86051 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.91444 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.91444 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.91444 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.91444 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.91581 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.91581 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.91581 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.91581 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.91581 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.91581 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
epss 0.91581 https://api.first.org/data/v1/epss?cve=CVE-2020-26950
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=1896306
generic_textual High https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26950
cvssv3.1 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2020-26950
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2020-26950
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2020-26950
archlinux Critical https://security.archlinux.org/AVG-1265
generic_textual High https://ubuntu.com/security/notices/USN-4625-1
generic_textual Medium https://ubuntu.com/security/notices/USN-4647-1
generic_textual critical https://www.mozilla.org/en-US/security/advisories/mfsa2020-49
generic_textual High https://www.mozilla.org/en-US/security/advisories/mfsa2020-49/#CVE-2020-26950
Reference id Reference type URL
http://packetstormsecurity.com/files/166175/Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free.html
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-26950.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26950.json
https://api.first.org/data/v1/epss?cve=CVE-2020-26950
https://bugzilla.mozilla.org/show_bug.cgi?id=1675905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26950
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://ubuntu.com/security/notices/USN-4625-1
https://ubuntu.com/security/notices/USN-4647-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-49/#CVE-2020-26950
https://www.mozilla.org/security/advisories/mfsa2020-49/
1896306 https://bugzilla.redhat.com/show_bug.cgi?id=1896306
ASA-202011-6 https://security.archlinux.org/ASA-202011-6
AVG-1265 https://security.archlinux.org/AVG-1265
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
CVE-2020-26950 https://nvd.nist.gov/vuln/detail/CVE-2020-26950
GLSA-202011-07 https://security.gentoo.org/glsa/202011-07
mfsa2020-49 https://www.mozilla.org/en-US/security/advisories/mfsa2020-49
RHSA-2020:5099 https://access.redhat.com/errata/RHSA-2020:5099
RHSA-2020:5100 https://access.redhat.com/errata/RHSA-2020:5100
RHSA-2020:5104 https://access.redhat.com/errata/RHSA-2020:5104
RHSA-2020:5135 https://access.redhat.com/errata/RHSA-2020:5135
RHSA-2020:5138 https://access.redhat.com/errata/RHSA-2020:5138
RHSA-2020:5139 https://access.redhat.com/errata/RHSA-2020:5139
RHSA-2020:5146 https://access.redhat.com/errata/RHSA-2020:5146
RHSA-2020:5162 https://access.redhat.com/errata/RHSA-2020:5162
RHSA-2020:5163 https://access.redhat.com/errata/RHSA-2020:5163
RHSA-2020:5164 https://access.redhat.com/errata/RHSA-2020:5164
RHSA-2020:5166 https://access.redhat.com/errata/RHSA-2020:5166
RHSA-2020:5167 https://access.redhat.com/errata/RHSA-2020:5167
USN-4625-1 https://usn.ubuntu.com/4625-1/
USN-4647-1 https://usn.ubuntu.com/4647-1/
Data source Metasploit
Description This modules exploits CVE-2020-26950, a use after free exploit in Firefox. The MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This exploit uses a somewhat novel technique of spraying ArgumentsData structures in order to construct primitives. The shellcode is forced into executable memory via the JIT compiler, and executed by writing to the JIT region pointer. This exploit does not contain a sandbox escape, so firefox must be run with the MOZ_DISABLE_CONTENT_SANDBOX environment variable set, in order for the shellcode to run successfully. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2, however only Firefox <= 79 is supported as a target. Additional work may be needed to support other versions such as Firefox 82.0.1.
Note
Reliability:
  - repeatable-session
SideEffects:
  - ioc-in-logs
Stability:
  - crash-safe
Ransomware campaign use Unknown
Source publication date Nov. 18, 2020
Platform Linux,Windows
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/browser/firefox_jit_use_after_free.rb
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26950.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2020-26950
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-26950
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-26950
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.97845
EPSS Score 0.55139
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.