CVE-2023-25734
NixOS vulnerability analysis and mitigation

Overview

CVE-2023-25734 is a security vulnerability affecting Firefox, Firefox ESR, and Thunderbird on Windows systems. The vulnerability was discovered by Ameen Basha M K and Shaheen Fazim and disclosed in February 2023. The issue affects Firefox versions < 110, Firefox ESR < 102.8, and Thunderbird < 102.8. The vulnerability allows attackers to exploit Windows .url shortcut files to cause unexpected network requests and potentially leak NTLM credentials (Mozilla Advisory).

Technical details

The vulnerability occurs when downloading a Windows .url shortcut from the local filesystem. An attacker could supply a remote path in the shortcut file that would trigger unexpected network requests from the operating system. The vulnerability is particularly concerning because it can be exploited through the IconFile parameter in .url files to leak NTLM credentials without user interaction. The issue has been assigned a CVSS v3.1 base score of 8.1 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N (NVD).

Impact

The primary impact of this vulnerability is the potential for credential theft and unauthorized network requests. When exploited, the vulnerability can lead to the disclosure of NTLM password hashes to remote attackers, which could be used for further attacks. The vulnerability affects only Windows systems, with other operating systems being unaffected (Mozilla Advisory, Bugzilla).

Mitigation and workarounds

Mozilla has addressed this vulnerability by implementing security measures to prevent the direct downloading of .url files. The fix was released in Firefox 110, Firefox ESR 102.8, and Thunderbird 102.8. The solution involves adding .url to the same blocklist as .lnk and .local files, causing these files to be downloaded with a .download extension to prevent automatic execution (Mozilla Advisory).

Community reactions

The vulnerability received attention from security researchers and the Mozilla security team, leading to multiple independent reports of the issue. The severity was initially classified as moderate, but further analysis revealed more serious implications, particularly regarding the ability to leak NTLM credentials without user interaction (Bugzilla).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14330CRITICAL9.8
  • NixOSNixOS
  • rhel10::firefox-flatpak
NoYesDec 09, 2025
CVE-2025-14329HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox
NoYesDec 09, 2025
CVE-2025-14333HIGH8.1
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025
CVE-2025-14332HIGH7.3
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox
NoYesDec 09, 2025
CVE-2025-14331MEDIUM6.5
  • NixOSNixOS
  • rhel10::thunderbird-flatpak
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management