CVE-2023-34414
low-risk
Published 2023-06-19
The error page for sites with invalid TLS certificates was missing the activation-delay Firefox uses to protect prompts and permission dialogs from attacks that exploit human response time delays. If a malicious page elicited user clicks in precise locations immediately before navigating to a site with a certificate error and made the renderer extremely busy at the same time, it could create a gap between when the error page was loaded and when the display actually refreshed. With the right timing the elicited clicks could land in that gap and activate the button that overrides the certificate error for that site. This vulnerability affects Firefox ESR < 102.12, Firefox < 114, and Thunderbird < 102.12.
Do I need to act?
-
0.06% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.1/10
Low
NETWORK
/ HIGH complexity
Affected Products (3)
Affected Vendors
References (12)
Permissions Required
https://bugzilla.mozilla.org/show_bug.cgi?id=1695986
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2023-19/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2023-20/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2023-21/
Permissions Required
https://bugzilla.mozilla.org/show_bug.cgi?id=1695986
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2023-19/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2023-20/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2023-21/
20
/ 100
low-risk
Severity
11/34 · Low
Exploitability
0/34 · Minimal
Exposure
9/34 · Low