Cyber Posture

CVE-2026-4690

High

Published: 24 March 2026

Published
24 March 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
EPSS Score 0.0002 4.6th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-4690 is a high-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Mozilla Firefox. Its CVSS base score is 8.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 4.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SC-39 (Process Isolation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely identification, reporting, and correction of flaws such as the integer overflow and boundary condition error in the XPCOM sandbox component via patching to fixed Firefox and Thunderbird versions.

prevent

Implements memory protection mechanisms that defend against exploitation of integer overflows leading to buffer overflows and sandbox escapes.

prevent

Enforces process isolation to strengthen sandbox boundaries and mitigate escapes resulting from flaws in components like XPCOM.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Sandbox escape via remote client exploitation enables privilege escalation (T1068) and client-side code execution (T1203); high availability impact directly supports DoS via application exploitation (T1499.004).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.

Deeper analysisAI

CVE-2026-4690 is a sandbox escape vulnerability stemming from incorrect boundary conditions and an integer overflow in the XPCOM component. It affects Mozilla Firefox versions prior to 149, Firefox ESR prior to 115.34 and 140.9, Thunderbird prior to 149 and 140.9. The issue is rated with a CVSS v3.1 base score of 8.6 and is associated with CWEs 190 (Integer Overflow or Wraparound), 754 (Improper Check for Unusual or Exceptional Conditions), and 120 (Buffer Copy without Checking Size of Input).

A remote attacker requires no privileges or user interaction and can exploit this over the network with low complexity. Successful exploitation results in a sandbox escape with a changed scope, leading to high availability impact such as denial of service, though without direct confidentiality or integrity violations.

Mozilla's security advisories (MFSA 2026-20 through 2026-23) and the associated Bugzilla entry detail the patch, recommending immediate updates to Firefox 149, Firefox ESR 115.34 or 140.9, Thunderbird 149, or Thunderbird 140.9 to mitigate the vulnerability.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 115.34.0 · ≤ 149.0 · 128.0 — 140.9.0

CVEs Like This One

CVE-2026-4687Same product: Mozilla Firefox
CVE-2026-4697Same product: Mozilla Firefox
CVE-2026-4706Same product: Mozilla Firefox
CVE-2026-5732Same product: Mozilla Firefox
CVE-2026-4714Same product: Mozilla Firefox
CVE-2026-4708Same product: Mozilla Firefox
CVE-2026-4685Same product: Mozilla Firefox
CVE-2026-4713Same product: Mozilla Firefox
CVE-2026-4686Same product: Mozilla Firefox
CVE-2026-4707Same product: Mozilla Firefox

References