Cyber Posture

CVE-2026-0892

Critical

Published: 13 January 2026

Published
13 January 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0892 is a critical-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Mozilla Firefox. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 6.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, prioritization, and correction of flaws like the memory safety bugs in CVE-2026-0892 via patching to Firefox 147 and Thunderbird 147.

prevent

Directly protects system memory from corruption vulnerabilities such as buffer overflows and improper memory operations underlying CVE-2026-0892 using techniques like address space layout randomization and data execution prevention.

prevent

Mandates receiving and implementing security advisories like Mozilla's MFSA 2026-01 and 2026-04 to prompt immediate updates addressing the memory safety bugs in CVE-2026-0892.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Memory corruption (CWE-119) with demonstrated potential for arbitrary code execution in client applications (Firefox/Thunderbird), directly enabling remote exploitation for client-side code execution with no user interaction required.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Memory safety bugs present in Firefox 146 and Thunderbird 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was…

more

fixed in Firefox 147 and Thunderbird 147.

Deeper analysisAI

CVE-2026-0892 is a set of memory safety bugs (CWE-119) affecting Firefox 146 and Thunderbird 146, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). These bugs involve improper restriction of operations within memory bounds, and some demonstrated evidence of memory corruption. Mozilla presumes that, with sufficient effort, certain bugs could enable arbitrary code execution.

Remote attackers require no privileges or user interaction to exploit these vulnerabilities over the network with low complexity. Successful exploitation could result in high confidentiality, integrity, and availability impacts, potentially allowing full compromise of the affected browser or email client.

Mozilla's security advisories (MFSA 2026-01 and MFSA 2026-04) detail the fixes applied in Firefox 147 and Thunderbird 147. Security practitioners should urge users to update immediately, with additional technical details available in the referenced Bugzilla entries (bugs 1986912, 1996718, 1999633, 2001081, 2004443).

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 147.0
mozilla
thunderbird
≤ 147.0

CVEs Like This One

CVE-2026-4710Same product: Mozilla Firefox
CVE-2025-9185Same product: Mozilla Firefox
CVE-2025-9179Same product: Mozilla Firefox
CVE-2025-8035Same product: Mozilla Firefox
CVE-2025-9184Same product: Mozilla Firefox
CVE-2026-0891Same product: Mozilla Firefox
CVE-2026-5731Same product: Mozilla Firefox
CVE-2026-6752Same product: Mozilla Firefox
CVE-2026-6776Same product: Mozilla Firefox
CVE-2026-2779Same product: Mozilla Firefox

References