Security News > 2020 > January > Critical Firefox 0-Day Under Active Attacks – Update Your Browser Now!

Attention! Are you using Firefox as your web browsing software on your Windows, Linux, or Mac systems?
If yes, you should immediately update your free and open-source Firefox web browser to the latest version available on Mozilla's website.
Why the urgency? Mozilla earlier today released Firefox 72.0.1 and Firefox ESR 68.4.1 versions to patch a critical zero-day vulnerability in its browsing software that an undisclosed group of hackers is actively exploiting in the wild.
Tracked as 'CVE-2019-17026,' the bug is a critical 'type confusion vulnerability' that resides in the IonMonkey just-in-time compiler of the Mozilla's JavaScript engine SpiderMonkey.
By default, automatically installs updates when they are available and activate a new version after a restart, you can always do a manual update using the built-in functionality by navigating to Menu > Help > About Mozilla Firefox.
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/DoAwkbwSvmA/firefox-cyberattack.html
Related news
- Critical Firefox, Tor Browser sandbox escape flaw fixed (CVE-2025-2857) (source)
- Mozilla Patches Critical Firefox Bug Similar to Chrome’s Recent Zero-Day Vulnerability (source)
- Apple Backports Critical Fixes for 3 Recent 0-Days Impacting Older iOS and macOS Devices (source)
- Critical auth bypass bug in CrushFTP now exploited in attacks (source)
- Browser extensions make nearly every employee a potential attack vector (source)
- Three Reasons Why the Browser is Best for Stopping Phishing Attacks (source)
- SAP fixes critical Netweaver flaw exploited in attacks (source)
- Majority of Browser Extensions Pose Critical Security Risk, A New Report Reveals (source)
- Fortinet fixes critical zero-day exploited in FortiVoice attacks (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-03-02 | CVE-2019-17026 | Type Confusion vulnerability in multiple products Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. | 8.8 |