CVE-2020-26964
Published: 9 December 2020
If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.
Notes
Author | Note |
---|---|
tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
Priority
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
impish |
Not vulnerable
(Android only)
|
bionic |
Not vulnerable
(Android only)
|
|
focal |
Not vulnerable
(Android only)
|
|
groovy |
Not vulnerable
(Android only)
|
|
hirsute |
Not vulnerable
(Android only)
|
|
jammy |
Not vulnerable
(Android only)
|
|
kinetic |
Not vulnerable
(Android only)
|
|
lunar |
Not vulnerable
(Android only)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(83)
|
|
xenial |
Not vulnerable
(Android only)
|
|
mantic |
Not vulnerable
(Android only)
|
|
mozjs38 Launchpad, Ubuntu, Debian |
impish |
Does not exist
|
bionic |
Needs triage
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
lunar |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
mantic |
Does not exist
|
|
mozjs52 Launchpad, Ubuntu, Debian |
impish |
Does not exist
|
hirsute |
Does not exist
|
|
bionic |
Needs triage
|
|
focal |
Needs triage
|
|
groovy |
Ignored
(end of life)
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
lunar |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
mantic |
Does not exist
|
|
mozjs60 Launchpad, Ubuntu, Debian |
impish |
Does not exist
|
bionic |
Does not exist
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
lunar |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
mantic |
Does not exist
|
|
mozjs68 Launchpad, Ubuntu, Debian |
impish |
Does not exist
|
focal |
Needs triage
|
|
bionic |
Does not exist
|
|
groovy |
Ignored
(end of life)
|
|
hirsute |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
lunar |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
mantic |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.8 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N |