CVE-2023-29532
NixOS vulnerability analysis and mitigation

Overview

A local privilege escalation vulnerability (CVE-2023-29532) was discovered in the Mozilla Maintenance Service affecting Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10 on Windows systems. The vulnerability was reported by Holger Fuhrmannek and disclosed on April 11, 2023. The issue allows a local attacker to bypass signature verification of update files by exploiting a write-lock bypass vulnerability when using a malicious SMB server (Mozilla Advisory).

Technical details

The vulnerability exists in the Mozilla Maintenance Service's update verification process. When updating, the service loads update data from a user-controlled path pointing to a MAR archive. Although signature verification is performed, the file is read twice - once for signature checking and once for the actual update. While the service attempts to write-lock the file to prevent modifications between reads, this lock is ineffective when the file is hosted on an SMB server. This allows an attacker to serve a legitimate signed file during verification and swap it with malicious content before the actual update process (Mozilla Bug).

Impact

The vulnerability allows a local attacker with system access to bypass signature verification and trick the Mozilla Maintenance Service into applying an unsigned malicious update. Since the Maintenance Service runs with SYSTEM privileges on Windows, this can lead to privilege escalation and arbitrary code execution at the highest privilege level. The vulnerability is rated as High severity with a CVSS v3.1 base score of 5.5 (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) (NVD).

Mitigation and workarounds

The vulnerability was fixed in Firefox 112, Firefox ESR 102.10, and Thunderbird 102.10. The fix involves loading the update file into RAM and verifying its integrity there rather than relying on file system locks. Users should update to these or later versions to mitigate the vulnerability (Mozilla Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22783HIGH8.1
  • NixOSNixOS
  • iris
NoYesJan 12, 2026
CVE-2026-0821MEDIUM6.9
  • NixOSNixOS
  • quickjs
NoNoJan 10, 2026
CVE-2025-68949MEDIUM5.3
  • NixOSNixOS
  • n8n
NoYesJan 13, 2026
CVE-2026-22784LOW2.3
  • NixOSNixOS
  • lychee
NoYesJan 12, 2026
CVE-2026-23497LOW1.3
  • NixOSNixOS
  • learning
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management