CVE-2022-26387
NixOS vulnerability analysis and mitigation

Overview

CVE-2022-26387 is a Time-of-Check Time-of-Use (TOCTOU) vulnerability discovered in Firefox's add-on signature verification process. The vulnerability affects Firefox versions prior to 98, Firefox ESR versions before 91.7, and Thunderbird versions before 91.7. When installing an add-on, Firefox verified the signature before prompting the user, but while the user was confirming the prompt, the underlying add-on file could have been modified without Firefox detecting the change (Mozilla Advisory).

Technical details

The vulnerability is classified with a CVSS v3.1 base score of 7.5 (High), with attack vector being Network, attack complexity High, requiring user interaction, and having potential High impact on confidentiality, integrity, and availability. The core issue is a TOCTOU violation in the add-on signature verification process, where Firefox would release the file after initial validation but before actual installation, creating a window of opportunity for file tampering (Ubuntu CVE).

Impact

The vulnerability could allow an attacker to bypass Firefox's add-on signature verification system. This could potentially lead to the installation of malicious add-ons that would otherwise be blocked by Firefox's security checks. The issue is particularly concerning for local file installations, where the attacker would know the exact file location, though it also affects web-based installations through temporary file manipulation (Mozilla Bug).

Mitigation and workarounds

The vulnerability was fixed in Firefox 98, Firefox ESR 91.7, and Thunderbird 91.7. The fix involves verifying the XPI content immediately before installation, after copying the file from its original location to a staging directory. This ensures that any tampering with the original file between initial verification and installation would be detected (Mozilla Bug).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61619HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61618HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61617HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61610HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61609HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management