{"dataType": "CVE_RECORD", "containers": {"adp": [{"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"unimportant\"}"}}}], "affected": [{"vendor": "debian", "product": "firefox-esr", "platforms": ["bookworm", "bullseye", "forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "firefox", "platforms": ["sid"], "defaultStatus": "unaffected"}], "references": [{"url": "https://security-tracker.debian.org/tracker/CVE-2025-2857"}], "descriptions": [{"lang": "en", "value": "Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape.  The original vulnerability was being exploited in the wild.  *This only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability was fixed in Firefox 136.0.4, Firefox ESR 128.8.1, and Firefox ESR 115.21.1."}], "providerMetadata": {"orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian", "dateUpdated": "2025-03-27T13:27:57.377Z", "x_subShortName": "debian"}}, {"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"None\"}"}}}], "affected": [{"vendor": "redhat", "product": "firefox", "platforms": ["cpe:/o:redhat:enterprise_linux:10"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2025-2857"}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1956398"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355327"}, {"url": "https://issues.chromium.org/issues/405143032"}, {"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2857"}, {"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"}, {"url": "https://www.mozilla.org/security/advisories/mfsa2025-19/"}], "descriptions": [{"lang": "en", "value": "Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. \nThe original vulnerability was being exploited in the wild. \n*This only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability was fixed in Firefox 136.0.4, Firefox ESR 128.8.1, and Firefox ESR 115.21.1."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2025-03-27T13:27:57Z", "x_subShortName": "redhat_10"}}, {"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Critical\"}"}}}], "affected": [{"vendor": "suse", "product": "MozillaFirefox", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-desktop-applications:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles-ltss:15", "cpe:/o:suse:sles-ltss:15:sp1", "cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-devel", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-desktop-applications:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles-ltss:15", "cpe:/o:suse:sles-ltss:15:sp1", "cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-translations-common", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-desktop-applications:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles-ltss:15", "cpe:/o:suse:sles-ltss:15:sp1", "cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-translations-other", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-desktop-applications:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles-ltss:15", "cpe:/o:suse:sles-ltss:15:sp1", "cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox", "versions": [{"status": "affected", "version": "0", "lessThan": "0:128.9.0-150200.152.176.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-desktop-applications:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-translations-common", "versions": [{"status": "affected", "version": "0", "lessThan": "0:128.9.0-150200.152.176.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-desktop-applications:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-translations-other", "versions": [{"status": "affected", "version": "0", "lessThan": "0:128.9.0-150200.152.176.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-desktop-applications:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaThunderbird", "platforms": ["cpe:/o:suse:packagehub:15:sp6", "cpe:/o:suse:sle-we:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaThunderbird-translations-common", "platforms": ["cpe:/o:suse:packagehub:15:sp6", "cpe:/o:suse:sle-we:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaThunderbird-translations-other", "platforms": ["cpe:/o:suse:packagehub:15:sp6", "cpe:/o:suse:sle-we:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1240140"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2857", "name": "Mitre CVE-2025-2857"}, {"url": "https://www.suse.com/security/cve/CVE-2025-2857", "name": "SUSE CVE-2025-2857"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPZDGNGYBK4QR6KUXRE4Q4EISA2CMNBS/", "name": "openSUSE-SU-2025:14948-1"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZKGV75ZSDUQ4HV5GEU5SXQRWEVYV5SQ/", "name": "openSUSE-SU-2025:14958-1"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WBRCQJYFKUAGSQ5SHW67JST3P5FSU4D/", "name": "openSUSE-SU-2025:14961-1"}], "descriptions": [{"lang": "en", "value": "\n    Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. \nThe original vulnerability was being exploited in the wild. \n*This only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability was fixed in Firefox 136.0.4, Firefox ESR 128.8.1, and Firefox ESR 115.21.1.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2025-03-28T00:00:00Z", "x_subShortName": "suse_server_15"}}, {"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Critical\"}"}}}], "affected": [{"vendor": "suse", "product": "MozillaFirefox", "versions": [{"status": "affected", "version": "0", "lessThan": "0:128.9.0-150200.152.176.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-desktop-applications:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-translations-common", "versions": [{"status": "affected", "version": "0", "lessThan": "0:128.9.0-150200.152.176.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-desktop-applications:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-translations-other", "versions": [{"status": "affected", "version": "0", "lessThan": "0:128.9.0-150200.152.176.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-desktop-applications:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaThunderbird", "platforms": ["cpe:/o:suse:packagehub:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaThunderbird-translations-common", "platforms": ["cpe:/o:suse:packagehub:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaThunderbird-translations-other", "platforms": ["cpe:/o:suse:packagehub:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox", "platforms": ["cpe:/o:suse:sle-module-desktop-applications:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-devel", "platforms": ["cpe:/o:suse:sle-module-desktop-applications:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-translations-common", "platforms": ["cpe:/o:suse:sle-module-desktop-applications:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-translations-other", "platforms": ["cpe:/o:suse:sle-module-desktop-applications:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1240140"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2857", "name": "Mitre CVE-2025-2857"}, {"url": "https://www.suse.com/security/cve/CVE-2025-2857", "name": "SUSE CVE-2025-2857"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPZDGNGYBK4QR6KUXRE4Q4EISA2CMNBS/", "name": "openSUSE-SU-2025:14948-1"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZKGV75ZSDUQ4HV5GEU5SXQRWEVYV5SQ/", "name": "openSUSE-SU-2025:14958-1"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WBRCQJYFKUAGSQ5SHW67JST3P5FSU4D/", "name": "openSUSE-SU-2025:14961-1"}], "descriptions": [{"lang": "en", "value": "\n    Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. \nThe original vulnerability was being exploited in the wild. \n*This only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability was fixed in Firefox 136.0.4, Firefox ESR 128.8.1, and Firefox ESR 115.21.1.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2025-03-28T00:00:00Z", "x_subShortName": "suse_desktop_15"}}, {"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Critical\"}"}}}], "affected": [{"vendor": "suse", "product": "MozillaFirefox", "platforms": ["cpe:/o:suse:sles:12:sp2", "cpe:/o:suse:sles:12:sp4", "cpe:/o:suse:sles:12:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-devel", "platforms": ["cpe:/o:suse:sles:12:sp2", "cpe:/o:suse:sles:12:sp4", "cpe:/o:suse:sles:12:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-translations-common", "platforms": ["cpe:/o:suse:sles:12:sp2", "cpe:/o:suse:sles:12:sp4", "cpe:/o:suse:sles:12:sp5"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1240140"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2857", "name": "Mitre CVE-2025-2857"}, {"url": "https://www.suse.com/security/cve/CVE-2025-2857", "name": "SUSE CVE-2025-2857"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPZDGNGYBK4QR6KUXRE4Q4EISA2CMNBS/", "name": "openSUSE-SU-2025:14948-1"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZKGV75ZSDUQ4HV5GEU5SXQRWEVYV5SQ/", "name": "openSUSE-SU-2025:14958-1"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WBRCQJYFKUAGSQ5SHW67JST3P5FSU4D/", "name": "openSUSE-SU-2025:14961-1"}], "descriptions": [{"lang": "en", "value": "\n    Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. \nThe original vulnerability was being exploited in the wild. \n*This only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability was fixed in Firefox 136.0.4, Firefox ESR 128.8.1, and Firefox ESR 115.21.1.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2025-03-28T00:00:00Z", "x_subShortName": "suse_server_12"}}, {"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Critical\"}"}}}], "affected": [{"vendor": "suse", "product": "MozillaFirefox", "versions": [{"status": "affected", "version": "0", "lessThan": "0:140.2.0-160000.1.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:140.2.0-160000.1.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-translations-common", "versions": [{"status": "affected", "version": "0", "lessThan": "0:140.2.0-160000.1.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "MozillaFirefox-translations-other", "versions": [{"status": "affected", "version": "0", "lessThan": "0:140.2.0-160000.1.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libmozjs-128-0", "versions": [{"status": "affected", "version": "0", "lessThan": "0:128.10.1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "mozjs128", "versions": [{"status": "affected", "version": "0", "lessThan": "0:128.10.1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "mozjs128-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:128.10.1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1240140"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2857", "name": "Mitre CVE-2025-2857"}, {"url": "https://www.suse.com/security/cve/CVE-2025-2857", "name": "SUSE CVE-2025-2857"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPZDGNGYBK4QR6KUXRE4Q4EISA2CMNBS/", "name": "openSUSE-SU-2025:14948-1"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZKGV75ZSDUQ4HV5GEU5SXQRWEVYV5SQ/", "name": "openSUSE-SU-2025:14958-1"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WBRCQJYFKUAGSQ5SHW67JST3P5FSU4D/", "name": "openSUSE-SU-2025:14961-1"}], "descriptions": [{"lang": "en", "value": "\n    Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. \nThe original vulnerability was being exploited in the wild. \n*This only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability was fixed in Firefox 136.0.4, Firefox ESR 128.8.1, and Firefox ESR 115.21.1.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2025-11-14T00:00:00Z", "x_subShortName": "suse_server_16"}}], "cna": {"metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "CHANGED", "version": "3.1", "baseScore": 10, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}], "affected": [{"cpes": ["cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"], "vendor": "mozilla", "product": "firefox", "versions": [{"status": "affected", "version": "0", "lessThan": "136.0.4", "versionType": "custom"}], "platforms": ["cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"], "vendor": "mozilla", "product": "firefox_esr", "versions": [{"status": "affected", "version": "128.0.0", "lessThan": "128.8.1", "versionType": "custom"}, {"status": "affected", "version": "0", "lessThan": "115.21.1", "versionType": "custom"}], "platforms": ["cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected"}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1956398"}, {"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"}, {"url": "https://www.mozilla.org/security/advisories/mfsa2025-19/"}, {"url": "https://issues.chromium.org/issues/405143032"}], "descriptions": [{"lang": "en", "value": "Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. \nThe original vulnerability was being exploited in the wild. \n*This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1."}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2025-03-28T15:25:30.861Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2025-2857", "state": "PUBLISHED", "dateUpdated": "2025-03-28T15:25:36.752Z", "assignerOrgId": "00000000-0000-4000-A000-000000000003", "datePublished": "2025-03-27T13:27:57.377Z", "assignerShortName": "nvd"}, "dataVersion": "5.0"}